Closed
Description
Submitted by: @AlexPeshkoff
Trace ignores the fact that users from different security databases are actually different users. For example, being authenticated as sysdba in master security database, one can collect trace information from any database, no matter of what security databases are configured for them, and what mapping rules are established or not.