DatabasesYou must select the database to work with and provide credentials before you can access data.Logging in to iBaseWhen you log in to iBase, you open a security file that defines the permissions for the user account to which you are logged on. The security file connection is closed when you log out.User and database propertiesInformation about your user permissions and the database design are available for you to view.Adding your contact informationDepending on your organization, you may need to enter contact details for queries about the data that you add to this database, or to help if people need to talk to you before editing, deleting, or merging records that you own. The contact details that are displayed are for the username that you useManaging database connectionsIf you have the correct permissions, you can view details about all the current connections, to the database that you have open. Current Connections provides information on who is logged in to that database, and their current level of activity.AuditingiBase can be set up to log information about the actions you carry out on a database. The details that are captured in the audit log, depend on the auditing level that has been applied to the database.Database subsetsA database subset is a portion of records in the database that are copied into a separate database. This collection of records are selected by creating a database subset definition that consists of the results of queries and sets.CasesData in your database might be organized into different cases. Each case contains records belonging to a particular investigation. You are assigned access to one or more cases by your database administrator.ReplicationiBase database replication is the process of automatically distributing copies of iBase data and database objects between SQL Server instances in different locations and keeping this data synchronized. The data is copied by use of SQL Server merge replication, using the standard tools provided in SQL Server.Parent topic: Using i2 iBase