Adding groups to a security file

Users gain the database management permissions that are accumulated from all database management groups of which they are a member. There is a similar combination of permissions or restrictions for the user’s membership of each other type of group.

If you are adding many users, you might want to consider this work flow:

  1. Identify the different types of user who will use iBase. Each type of user is represented by one or more Database Management groups, and possibly by other groups of different types depending on the complexity of your security arrangements.
  2. Define the permissions for each of the required groups.
  3. Define a template user to represent each user type and assign them to the correct groups.
  4. Finally, create each user and assign permissions by copying the permissions of the appropriate template user.