System table identifiers all begin with the prefix RDB$
.
List of System Tables
Stores authentication and other security mappings
History of backups performed using nBackup
Section D.3, RDB$CHARACTER_SETS
Names and describes the character sets available in the database
Cross references between the names of constraints (NOT NULL
constraints, CHECK
constraints and ON UPDATE
and ON DELETE
clauses in foreign key constraints) and their associated system-generated triggers
Collation sequences for all character sets
Virtual table with configuration settings applied for the current database
Basic information about the database
A list of users granted the CREATE DATABASE
privilege when using the specified database as a security database
Information about dependencies between database objects
Custom database exceptions
Column and domain definitions, both system and custom
Dimensions of array columns
Information about secondary files and shadow files
Information about BLOB filters
Information about changes in the formats of tables
Information about external functions
Section D.17, RDB$FUNCTION_ARGUMENTS
Attributes of the parameters of external functions
Information about generators (sequences)
Segments and index positions
Definitions of all indexes in the database (system- or user-defined)
Not used in the current version
Stores the definition (header and body) of SQL packages
Information about database pages
Definitions of stored procedures
Parameters of stored procedures
Section D.28, RDB$REF_CONSTRAINTS
Definitions of referential constraints (foreign keys)
Headers of tables and views
Section D.30, RDB$RELATION_CONSTRAINTS
Definitions of all table-level constraints
Top-level definitions of table columns
Role definitions
Access control lists
Time zones
State of multi-database transactions
Trigger definitions
Trigger messages
SQL privileges granted to system users
Section D.40, RDB$VIEW_RELATIONS
Tables that are referred to in view definitions: one record for each table in a view
D.1 RDB$AUTH_MAPPING
RDB$AUTH_MAPPING
stores authentication and other security mappings.