X hits on this document

114 views

0 shares

0 downloads

0 comments

4 / 48

Commonality between ISV software like SAP and their competitors

Authorization and Authentication done on application level

Real user name not seen on database side

Hardly a chance to audit on database side

Hard to trace activity on database side

Applications rely on certain Index and/or object configurations

Not recommendable to create indexes on the database level only

Indexes better be created through application maintenance logics

File groups not recognized by applications

When file groups are being used, application release upgrade scripts might need manual modification

DBA-416M• ISV configurations & implementations – Lessons Learned

Document info
Document views114
Page views114
Page last viewedThu Dec 08 20:17:49 UTC 2016
Pages48
Paragraphs862
Words4327

Comments