connectors
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
connectors [2023/11/02 08:13] – [Security considerations] dmitry | connectors [2023/11/02 08:14] – [Security considerations] dmitry | ||
---|---|---|---|
Line 96: | Line 96: | ||
* In connectors, use read-only accounts and don't expose unnecessary objects (e.g. schemas, tables, etc.) | * In connectors, use read-only accounts and don't expose unnecessary objects (e.g. schemas, tables, etc.) | ||
* Don't use embedded connectors for accessing sensitive information because they can be easily copied unless dynamic authentication is used (such as " | * Don't use embedded connectors for accessing sensitive information because they can be easily copied unless dynamic authentication is used (such as " | ||
- | * Keep in mind that users may write and execute custom SQL queries/ | + | * Keep in mind that users may perform various operations (e.g. write and execute custom SQL queries/ |
* SQL-related actions (such as " | * SQL-related actions (such as " | ||
connectors.txt · Last modified: 2024/04/19 00:37 by dmitry