{"version":"1.0","provider_name":"Database Tutorials","provider_url":"https:\/\/dbtut.com","author_name":"Marc Daccache","author_url":"https:\/\/dbtut.com\/index.php\/author\/marcdaccache\/","title":"Tracking configuration changes in SAP ASE 16 - Database Tutorials","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"bCXZVY57c8\"><a href=\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/\">Tracking configuration changes in SAP ASE 16<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/dbtut.com\/index.php\/2018\/08\/13\/tracking-configuration-changes-in-sap-ase-16\/embed\/#?secret=bCXZVY57c8\" width=\"600\" height=\"338\" title=\"&#8220;Tracking configuration changes in SAP ASE 16&#8221; &#8212; Database Tutorials\" data-secret=\"bCXZVY57c8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/dbtut.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Introduction A principal component of a protected system is accountability. One way to ensure accountability is to examine events on the system. Many events that occur in SAP ASE can be recorded, such as \u2013 but not limited to &#8211; DMLs and DDLs. Auditing is an important part of security in any RDBMS. By probing &hellip;","thumbnail_url":"http:\/\/dbtut.com\/wp-content\/uploads\/2018\/08\/547.png"}