CDT security strategy

The Configuration Deployment Tool makes use of the user authentication and authorization supplied by your database provider. Access control and authorization are not specified through the Configuration Deployment Tool.

Ensure that the person using the Configuration Deployment Tool has sufficient authentication privileges (select, insert, update, and delete) for both databases; full DBA privileges are not required.