One solution is full replication of all authorization rules although maintaining replication
is quite expensive in this case.
Another solution enforces access privileges by performing a remote query to the sites that
holds the group defi nitions.
Another alternative solution is to replicate a group defi nition at each site containing a
database object that can be accessed by users of that group.
The last two solutions decrease the degree of autonomy. It is obvious that full replication of autho-
rization information simplifi es authorization control, as it can be done at compile time. However, the
overhead cost for ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.