Managing i2 iBaseThe Managing i2 iBase documentation provides information to help you configure and administer iBase.Opening a databaseIf you are a database administrator or a security administrator, you can open a database, or create a new one, after logging on to a security file. You can have several databases open in the same session provided that the databases are associated with the same security file.Listing recordsYou can list the records for a selected entity or link type so that you can review the data and take action as required. All the field values are shown, as well as the label for the entity or link type as defined in the default labeling scheme.About the example databaseAn example database called User Guide.idb is installed with the product. This can be used to understand the way that databases can be set up, allowing you to apply these concepts to your database.Security files, users, and groupsA security file controls who is allowed to log on to iBase and, after they have logged on, what they are allowed to do in both iBase and iBase Designer. Permissions are defined by creating user groups and assigning users to those groups.Configuring and maintaining databasesYou can create and maintain iBase databases, whether in Microsoft™ Access or SQL Server format.Designing a databaseThe best design for a database is determined by the type of data you need to capture, and the intended type of analysis.Managing securityYou can define a security policy and create new users and security groups using the Security Manager. All groups have users as members.Setting Up SearchThere are two main ways to search for text in an iBase database, Search 360 (in SQL Server databases only) or Word Search. An index must exist before users can use either search method.Configuring alertingAlerting monitors records to detect when an item of interest changes or is viewed by someone. To monitor items of interest, alert definitions are added to records (single or multiple) and to queries. When a change is detected, an alert is raised.Administering iBaseThere are a number of options that you can use to affect the way that iBase and iBase Designer operate on the local machine that are not database specific. These options can be selected without logging into a specific database.Administering a databaseYou can change options on how iBase functions. These settings can affect the user account that you are currently using, the machine on which iBase is currently installed, or the entire database.Working with casesYou can partition data in your database into different cases. Each case contains records belonging to a particular investigation.Importing and exporting dataThis documentation provides information to help you import and export data.Working with categoriesYou can manage your folder objects (such as import specifications) by storing them in categories. In this way you can keep folder objects together by user or by case.Creating a record of actions for your databaseYou can set up iBase to log virtually all user actions with or without user-supplied reasons the actions. Different auditing levels can be set depending on the requirements of your environment.Replicating and synchronizing databasesiBase database replication is the process of automatically distributing copies of iBase data and database objects between SQL Server instances in different locations and keeping this data synchronized. The data is copied by use of SQL Server merge replication, using the standard tools provided in SQL Server. iBase database replication provides more tools to manage the iBase database. All servers that are involved in replication must use the same SQL Server version.Creating a database indexThe Index Service Configuration tool indexes one or more i2® iBase databases. You use this tool to enable the databases for Search 360.Scheduling imports and exportsIn i2 iBase, you define the data that you want to import or export as one or more import or export specifications. You can group them together in the sequence you want them to run, in import batch or export batch specifications. These batch specifications are run by iBase Scheduler by using a Windows™ service that you configure with the Scheduler Configuration utility.Managing access to data and functionsYou can install and operate i2® iBase and ensure that access is securely controlled. Access to data and functions is based on the user name and password that are specified by the user when they log on to iBase, but to fully ensure control of the data it is also necessary to manage the physical and logical security of other aspects of the whole system.Deploying Analysis StudioAnalysis Studio adds significant new functionality to an existing deployment of i2 iBase. In particular, it enables analysts to enrich their investigations with records from i2 Connect data sources.Parent topic: i2 iBase documentation