Creating users and groups
The first step in designing security for your iBase is to identify the groups of administrators and users that you want to use. iBase is supplied with some default groups and an administrative user, all of which are created in any new security file.
You can add new groups and users, and modify or remove the supplied groups and users. You must modify the administrative user, if only to set a secure password in place of the default. If you do not use single sign-on, and before you add any users, you might need to define a security policy to control passwords and how users log on.
As an administrator, you need to create a user account for each individual who uses iBase, or access an iBase database from Analyst's Notebook®. This allows them to log on to the security file and open the database with the lowest possible level of access to the data. You define what they can do in iBase by setting up database management groups with specific permissions and assigning users to those groups.
Users gain the permissions that are accumulated from all database management groups of which they are a member. Further control is possible by creating other types of group.