iBase files on the network (permissions)

The iBase security file and database are managed through the security (.ids) and database (.idb) files.

For Microsoft™ Access format security files and databases, the .ids and .idb files contain all the data in the iBase system (apart from the audit log data held in the .idl file). However, when you use the SQL Server format security file and databases, these files contain only the information that is required to connect to the SQL Server instance and databases. All other data is stored within the SQL Server databases.

For successful operation of iBase, all users need the ability to create and delete files in the folder that contains the security file and database. This is because iBase creates and deletes multi-user lock files in this folder.

It is important for both access control and normal system management that users are prevented from deleting the security (.ids) and database (.idb) files. You should apply security settings to these folders and files to prevent this.

The access permissions that are required on the iBase security file and database depends on whether Microsoft Access or SQL Server is in use for storing the data:

  • It is necessary for iBase to write to the Access format security file whenever a user logs in to the security file because a Microsoft Access format security file contains the Security Audit log.

  • When an SQL Server format security file is used, iBase only needs to write to the Microsoft Access connection file when the database properties or connection details are changed. This operation can be performed through iBase Designer or the Database Configuration utility by an iBase user with both the Security Administrator and Database Administrator roles only.

The following tables detail the permissions necessary on the folder, security file, and database files for the various configurations and roles in the iBase system.

 

Role

Minimum Windows permissions

Folder containing the iBase security file and database

All roles

Modify

Security file

All roles

Read, Write

Database file

All roles

Read, Write

Audit log file

All roles

Read, Write

 

Role

Minimum Windows permissions

Folder containing the iBase security file and database

All roles

Modify

Security file

All roles

Read, Write

Database connection file

Users with Security Administrator role

Read, Write

All other roles

Read

Audit log file

-

-

 

Role

Minimum Windows permissions

Folder containing the iBase security file and database

All roles

Modify

Security connection file

Users with Security Administrator roles

Read, Write

All other roles

Read

Database connection file

Users with both Security and Database Administrator roles

Read, Write

All other roles

Read

Audit log file

-

-