Skip to main content
Skip table of contents

DB Access Control

Overview

To manage database access and security comprehensively, QueryPie offers various forms of access control based on roles and attributes. Authenticated users can access only the databases they are authorized to via QueryPie, and SQL execution is limited based on predefined syntax combinations. Starting from initial QueryPie user authentication to database access, you can safeguard sensitive data with IP band-specific controls, long-term disconnection controls, time-of-day and day-of-week restrictions, table/column lookup limitations, and more. Any modifications to your security policies are instantly applied to user sessions, allowing you to implement updated measures in real-time.

Related Menus

  • QueryPie Web > Settings > Database Settings > DB Access Control > Privileges

  • QueryPie Web > Settings > Database Settings > DB Access Control > Access Control

Access to the Access Control Guide

If you wish to establish database access or oversee existing access permissions, please refer to the following article:

If you wish to grant users or groups access to your database, or manage access that has already been granted, please refer to the article below:

Related Topics

 

Back to Main

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.