Inventory is a central repository that helps to create, keep track and share information about databases, applications, people and dependencies between. While it is possible to maintain data manually, DBMaster provides tools to automatically import information data from various sources like database servers, active directory, monitoring tools and other applications. Most importantly DBMaster helps keep it consistent, comprehensive and synchronized for effective database administration.
A data dictionary project keeps metadata about individual schemas to describe database objects: meaning, relationships, origin, usage, and format. While database vendors provide tools to build data dictionaries, many projects still fail to meet high quality standards. DBMaster focuses on collaboration aspects and removes barriers to keep documentation up to date: all team members including developers, analysts, quality assurance, and managers can access, search and update metadata via browser - no special tools needed. DBMaster makes it easy to start building data dictionary, keep it complete and synchronized with physical schemas.
Tools in dbmaster can leverage information from inventory and data dictionary projects, external data and API to provide extended functionality: security, consistency and quality reports, import and export of data records, metric collection, search functions, change control and tracking. DBMaster provides a complete runtime infrastructure like security settings, scheduling, saving and sharing parameters sets, execution history, direct access via URL, export to html and excel, and much more. Developers and database administrators can use DBMaster to automate routine tasks and provide easy to use self-service platform to users.
DBMaster is a production-proven enterprise platform and became a mission-critical application for some organizations. Enterprise edition provides integration with existing authentication infrastructure (like active directory or ldap). Administrators can create multiple projects and assign different roles to users: read-only, modification, or full control. Additional level of security brings access lists for tools: it is possible to define who can execute tools and view history of executions. Every project can be customized with a different set of fields in order to focus users on tasks specific for that project.