You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()
- A、Create the role with external authentication.
- B、Create the role as a secure application role.
- C、Create the role as a password-protected role.
- D、Create a role and use Fine-Grained Access Control (FGAC) to secure the role
正确答案:B
答案解析:有
微信扫一扫手机做题