Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Connection to the database is established using the user credentials.
  2. Check is performed to determine whether the user has permission to access the finance schema.
  3. Permission to access the finance schema is granted, if the user has sufficient role permissions. See Maintaining public finance role security access in the single database structure.
  4. Application switches its connection to the credentials stored in pvSyndatabases for every subsequent call.
  5. Application switches its connection to utilise the relevant finance user stored in pvSyndatabases, if permission to access the finance schema was granted.