The following table provides you with basic information about the permissions needed to secure access to remote servers to collect data from databases.
Data Source | Protocol / Technology | User Permissions and Credentials | Notes |
---|---|---|---|
Database | JDBC | User credentials are needed to authenticate access to the particular database. Each database has a particular method for providing access control to the particular tables that need to be accessed. | The user needs sufficient permission to execute any specified SQL statements. |