You are developing an Extensible Data Security (XDS) policy. Which item must you use?
A . query on the constrained table
B . constrained map
C . query on the primary table
D . duty context
Answer: A
You are developing an Extensible Data Security (XDS) policy. Which item must you use?
A . query on the constrained table
B . constrained map
C . query on the primary table
D . duty context
Answer: A