About Using Shared Schemas for Enterprise User Security

The following sections describe shared schemas, and how to set them up: