The following factors determine the security concerning what users can execute an SPL program and what database objects can be accessed by users who are executing the SPL program.
- Permission to execute the program.
- Permissions granted on the database objects (including other SPL programs) that the program attempts to access.
- Whether the SPL program is created with the definer's or caller's permission.