DB Access Control
Overview
To manage database access and security comprehensively, QueryPie offers various forms of access control based on roles and attributes. Authenticated users can access only the databases they are authorized to via QueryPie, and SQL execution is limited based on predefined syntax combinations. Starting from initial QueryPie user authentication to database access, you can safeguard sensitive data with IP band-specific controls, long-term disconnection controls, time-of-day and day-of-week restrictions, table/column lookup limitations, and more. Any modifications to your security policies are instantly applied to user sessions, allowing you to implement updated measures in real-time.
Related Menus
QueryPie Web > Settings > Database Settings > DB Access Control > Privileges
QueryPie Web > Settings > Database Settings > DB Access Control > Access Control
Access to the Access Control Guide
If you wish to establish database access or oversee existing access permissions, please refer to the following article:
If you wish to grant users or groups access to your database, or manage access that has already been granted, please refer to the article below:
Related Topics