Learn more about Toad for SQL Server
at Dell Software

Find solutions and downloads at the
Toad for SQL Server Support Portal

Toad for SQL Server 6.6

You are here: Manage Administration Tasks > Set Up Toad Security > About Setting Up Toad Security

Set Up Toad Security

Use Toad Security to apply restrictions on Toad functionality to specific database connections. For example, you can make a specific connection Read-Only in Toad.

The common security restriction types are:

Notes:

To set up Toad Security

  1. Connect to the database for which you want to restrict functionality.
  2. Then select Tools | Administer | Toad Security from the menu. The Security Credentials dialog opens.
  3. Do one of the following:
    1. Select which user account (Server or Client) to restrict. Toad automatically enters the selected account's user name for the current connection.
    2. Or select Role to restrict functionality for a specific role, and then enter the role.
  4. Click OK.
  5. Toad uses a table (TOADSECURITY) on the database for storing the restrictions. If the table does not yet exist, you are prompted to create it. Click OK in the prompt to open the Server-Side Objects dialog.

    Note: To successfully create the table, you must have the appropriate database privileges.

    1. Select Toad Security Table. Then select the roles or users to which you want to grant permissions to modify the TOADSECURITY table.
    2. Click Show Script. Then click Execute to create the TOADSECURITY table. See Define Server Side Objects for more information about creating the TOADSECURITY table.
  6. When the Toad Security window opens, select the functions to restrict for the user account (or role) you selected in step 3. Expand each node to select from the following restriction types:
    1. Action—Use this section to disable specific Toad Data Point actions.
    2. Browser—Use this section to disable access to specific object types.
    3. Custom—Use this section to apply read-only permissions to the data grid or to all of Toad Data Point.
  7. If you would like to apply read-only restrictions, expand the Custom node. Then select one of the following:
  8. To save your changes, click the green checkmark on the Toad Security toolbar.

    Note: If the Toad Security toolbar is not displayed, use the Customize dialog to add it. See Customize Toolbars and Menus for more information.

Tips:

 

of