Revoking database server access from mapped users (UNIX, Linux)
Use the REVOKE ACCESS FROM statement to remove surrogate user properties from specific mapped users.
Only user informix or a DBSA can run the REVOKE ACCESS FROM statement.
The REVOKE ACCESS FROM statement does not affect any access privileges of the HCL OneDB™ user account name that accesses the database server through an OS-level account on the host computer.
Example:
User informix or a DBSA can run the following statement on a system that supports mapped users, and one of the mapped users is user bob:
REVOKE ACCESS FROM bob;
This statement entirely removes the access of user bob to the database server, except when one or both of the following is true:
- PUBLIC is mapped to surrogate user properties. In this case, user bob still retains the same access privileges that the PUBLIC group holds.
- User bob is also a user account on the HCL OneDB host computer with database server access.