Implementing Query Security
These topics discuss how to:
Define query profiles.
Build query access group trees.
Work with query trees.
Define row-level security and query security records.
Note: You perform these setup tasks using the Query Access Manager, Application Designer, and permission lists. After you define Query Access Group trees, you provide user access using the Query tab in Permission Lists.