The following factors determine the security concerning what users can execute an SPL program and what database objects can be accessed by users who are executing the SPL program:
  • Permission to execute the program.
  • Permissions granted on the database objects (including other SPL programs) that the program attempts to access.
  • Whether the SPL program is created with the definer's or caller's permission.