Remote Automation Solutions Security Replication enables database security configuration to be maintained across a number of OpenEnterprise databases distributed over a wide area network. This can be useful for organizations that need to ensure that their security configuration is consistent across all of their databases, or for organizations that need to replicate their security configuration to a disaster recovery site.
The Security Replication component runs on the designated Security Configuration Source Server and connects to the Target Security Configuration Servers to ensure that security configuration is replicated across the whole system according to the directives contained in the SecurityReplication table.
Remote Automation Solutions Security Replication enables database security configuration to be maintained across a number of OpenEnterprise databases distributed over a wide area network. This can be useful for organizations that need to ensure that their security configuration is consistent across all of their databases, or for organizations that need to replicate their security configuration to a disaster recovery site.
The Security Replication component runs on the designated Security Configuration Source Server and connects to the Target Security Configuration Servers to ensure that security configuration is replicated across the whole system according to the directives contained in the SecurityReplication table.
Remote Automation Solutions Security Replication enables database security configuration to be maintained across a number of OpenEnterprise databases distributed over a wide area network. This can be useful for organizations that need to ensure that their security configuration is consistent across all of their databases, or for organizations that need to replicate their security configuration to a disaster recovery site.
The Security Replication component runs on the designated Security Configuration Source Server and connects to the Target Security Configuration Servers to ensure that security configuration is replicated across the whole system according to the directives contained in the SecurityReplication table.
Ask a question and I''ll find the answer in the document
Finding information in a document is now easier with AI