Chat now with support
Chat with Support

Toad Data Point 6.0 - Installation Guide

Tables in TIC

TIC tables always reflect the current data in the source table. TIC tables can be public, private, or shared with a list of users.

Note: This feature is available in the Toad Data Point Professional edition only and requires access to a Toad Intelligence Central server.

Operations

Use the following operations (commands) from the Object Explorer toolbar or the right-click menu.

Operation Description

Click to configure sharing (visibility) options for the selected table. Specify Sharing and Manage Privileges for Objects

Drops the selected table.

Locks the selected table. Lock and Unlock Objects

Unlocks the selected table. Lock and Unlock Objects

Manage Privileges

Users with Manage privileges can do the following (unless the object is locked):

  • Lock the object
  • Drop the object
  • Modify the object's sharing options
  • Rename the object
  • (Automation scripts and Toad files) Edit the script or file
  • (Snapshot) Refresh snapshot or modify refresh schedule
  • (Automation scripts) Modify schedule
  • (Automation scripts) Change user account for script execution
  • (Views and Automation scripts) Modify the default value for a variable
  • (Data objects) Modify a shared (public) key password
  • (Views) Change the type of Authentication key
  • (Secured folders) Modify the folder's sharing and manage options
  • (Secured folders) Rename or delete the secured folder
  • (Secured folders) Create a subfolder

  

Related Topics

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating