Appendix F. Security tables
The names of the security tables have SEC$
as prefix. They display data from the current security database. These tables are virtual in the sense that before access by the user, no data is recorded in them. They are filled with data at the time of user request. However, the descriptions of these tables are constantly present in the database. In this sense, these virtual tables are like tables of the MON$
-family used to monitor the server.
Security
SYSDBA, users with the
RDB$ADMIN
role in the security database and the current database, and the owner of the security database have full access to all information provided by the security tables.Regular users can only see information on themselves, other users are not visible.
Important
These features are highly dependent on the user management plugin. Keep in mind that some options are ignored when using a legacy control plugin users.
List of security tables
Lists users and roles granted the CREATE DATABASE
privilege
Section F.2, SEC$GLOBAL_AUTH_MAPPING
Information about global authentication mappings
Lists users in the current security database
SEC$USER_ATTRIBUTES
Additional attributes of users
F.1 SEC$DB_CREATORS
Lists users and roles granted the CREATE DATABASE
privilege.
Column Name | Data Type | Description |
---|---|---|
|
| Name of the user or role |
|
| Type of user:
|