In a target environment, you can prevent the distribution
and deployment of packages that come from restricted source environments.
To accept packages that come only from an authorized source environment,
set restrictions on all other environments.
Before you begin
Obtain the host names, database names, and database schema
names of the restricted source environments from a system administrator.
About this task
For a database distribution, the application checks the
target for any restrictions before distribution. If a restriction
is found, the database is not distributed to the target. For a file
distribution, restrictions are checked when a package file is selected
for deployment.
Procedure
- In a target environment, start the Migration Manager application
and click .
- In the Set Inbound Restrictions window,
click New Row.
- In the Database Host field, specify
the host name of the computer where the database is running. For example,
if the fully qualified host name is xyz.usa.example.com, type xyz in
the field.
- In the Database Name field, specify
the database instance or the database identifier on the server where
the database is running. For databases that use names
longer than eight characters, such as Oracle databases, the first
eight characters of the name must be unique so that inbound restrictions
for different source environments are applied correctly.
- In the Database Schema field, specify
the database schema in the database instance on the computer where
the database is running.
- Click OK.