I have two users A and B. User A can use Toad but user B has 100% toad security restrictions (i.e. B cannot access Toad.) So if user B logs into Toad and he gets blocked; however, user A can log into Toad then go into the Editor and type
connect user_B/ some_password
Now user A has a connection to Oracle using user B's connection. Can Toad provide security for this action?
You need to be signed in and under a current maintenance contract to view premium knowledge articles.
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy Cookie Preference Center