(Michael Sansoterra) For most database-related applications, using adopted authority is the preferred way to temporarily grant users controlled access to sensitive data. But one limitation of the adopted authority model is that it doesn’t override IFS permissions.
Read More - Register for Free Membership
