you can run: (echo localhost; echo u; echo admin; echo "<admin_password>"; echo "-t connectra_policy -pf"; echo "-q") | queryDB_util
This will dump it out in this format which you can then go through and extract relevant info:
Q u e r y i n g D B
=====================
Object Name: connectra_authorization_policy
Table Name: connectra_policy
Fields Details
--------------
connectra_authorization_rules: (
0: (
applications: Name: World_Clock (Table: network_applications)
comment: Rule created automatically by Mobile Access wizard.
install_on: Name: Any (Table: globals)
user_groups: Name: grp_usertest (Table: users)
)
)
A total of 1 objects match the query.