Бележка
Достъпът до тази страница изисква удостоверяване. Можете да опитате да влезете или да промените директориите.
Достъпът до тази страница изисква удостоверяване. Можете да опитате да промените директориите.
This section explains the factors to consider when designing a DML trigger.
| Topic | Description |
|---|---|
Explains the different ways AFTER triggers and INSTEAD OF triggers can be designed. |
|
Provides examples to illustrate the differences in firing behavior between AFTER and INSTEAD OF triggers. |
|
Explains how AFTER and INSTEAD OF triggers execute once they fire. |
|
Explains design guidelines unique to INSTEAD OF triggers. |
|
Explains how trigger code can run under escalated privileges and how to mitigate this threat. |