G
Guest
I was just wondering what the school of thought on this is, I haven't been
able to find too much information on it other that what is in the Security
FAQ. What are the implications of applying security to a database before you
split it versus after it has been split to FE/BE?
able to find too much information on it other that what is in the Security
FAQ. What are the implications of applying security to a database before you
split it versus after it has been split to FE/BE?