Subject | Re: User name SYSDBA |
---|---|
Author | johnson_dave2003 |
Post date | 2005-08-10T07:55:41Z |
--- In Firebird-Architect@yahoogroups.com, "Claudio Valderrama C."
<cvalde@u...> wrote:
to validate the requests as they are made through lookaside
mechanisms. The actual mechanisms can be very efficient, with careful
planning.
<cvalde@u...> wrote:
> If all requests are going to be invalidated when a role is switchedto the
> dynamically, I really do not see the big difference with reattaching
> db. I wish there was a way to calculate those permissions quickly.will be
> Otherwise, we are defeating the advantage of cached requests: they
> only be valid for the current connection and while roles don't change.I don't see the need to invalidate the current requests. I see a need
>
> C.
to validate the requests as they are made through lookaside
mechanisms. The actual mechanisms can be very efficient, with careful
planning.