Open topic with navigation
You are here: Manage Administration Tasks > Set Up Toad Security > About Setting Up Toad Security
Set Up Toad Security
Use Toad Security to apply restrictions on Toad functionality to specific database connections. For example, you can make a specific connection Read-Only in Toad.
The common security restriction types are:
-
Actions—Restricts
functionality available using a menu or toolbar button.
-
Browser—Restricts the object
types that display in the Database Explorer/Object Explorer. Also restricts
the object details that display when selecting an object.
Notes:
-
You cannot use
Toad Security to enable functionality that would otherwise be disabled.
-
Toad reads the security settings only
during the initial connection and settings are not refreshed until the next
time you make a connection, regardless of any updates.
To set up Toad Security
- Connect to the database for which you want to restrict functionality.
- Then select Tools | Administer | Toad Security from the menu. The Security Credentials dialog opens.
- Do one of the following:
- Select which user account (Server or Client) to restrict. Toad automatically enters the selected account's user name for the current connection.
- Or select Role to restrict functionality for a specific role, and then enter the role.
- Click OK.
-
Toad uses a table (TOADSECURITY) on the database for storing the restrictions. If the table does not yet exist, you are prompted to create it. Click OK in the prompt to open the Server-Side Objects dialog.
Note: To successfully create the table, you must have the appropriate database privileges.
- Select Toad Security Table. Then select the roles or users to which you want to grant permissions to modify the TOADSECURITY table.
- Click Show Script. Then click Execute to create the TOADSECURITY table. See Define Server Side Objects for more information about creating the TOADSECURITY table.
- When the Toad Security window opens, select the functions to restrict for the user account (or role) you selected in step 3. Expand each node to select from the following restriction types:
- Action—Use this section to disable specific Toad Data Point actions.
- Browser—Use this section to disable access to specific object types.
- Custom—Use this section to apply read-only permissions to the data grid or to all of Toad Data Point.
- If you would like to apply read-only restrictions, expand the Custom node. Then select one of the following:
- ReadOnlyDatabase—Disables all actions that modify the database, including INSERT, DELETE, CREATE.
- ReadOnlyGrid—Disables actions in the data grid that modify data in the database.
-
To save your changes, click the green checkmark
on the Toad Security toolbar.
Note: If the Toad Security toolbar is not displayed, use the Customize dialog to add it. See Customize Toolbars and Menus for more information.
Tips:
- Click
to set security for a different user or role.
- Click
to
apply the current security settings to a new user or role.