In the beginning of this chapter, we discussed the security overview of MDM 7.1. Then, we moved on to managing users and roles using the built-in system tables. We understood the concept of role-based privileges such as functional privileges, table, and fields access along with record constraints. Trusted connections and how to maintain them was discussed next. Finally, we listed other system tables that are available in MDM and understood their function.
In the next chapter, we will discuss advanced security concepts with respect to the MDM server, network security, user access, and authentication.