iBase files on the network (permissions)
The iBase security file and database are managed through the security
(.ids
) and database (.idb
) files.
For Microsoft™ Access format security files and
databases, the .ids
and .idb
files contain all the
data in the iBase system (apart from the audit log data held in the
.idl
file). However, when you use the SQL Server format security
file and databases, these files contain only the information that is required to connect
to the SQL Server instance and databases. All other data is stored within the SQL Server
databases.
For successful operation of iBase, all users need the ability to create and delete files in the folder that contains the security file and database. This is because iBase creates and deletes multi-user lock files in this folder.
It is important for both access control and normal system management that users are prevented
from deleting the security (.ids
) and database (.idb
) files. You
should apply security settings to these folders and files to prevent this.
The access permissions that are required on the iBase security file and database depends on whether Microsoft Access or SQL Server is in use for storing the data:
- It is necessary for iBase to write to the Access format security file whenever a user logs in to the security file because a Microsoft Access format security file contains the Security Audit log.
- When an SQL Server format security file is used, iBase only needs to write to the Microsoft Access connection file when the database properties or connection details are changed. This operation can be performed through iBase Designer or the Database Configuration utility by an iBase user with both the Security Administrator and Database Administrator roles only.
The following tables detail the permissions necessary on the folder, security file, and database files for the various configurations and roles in the iBase system.
Role | Minimum Windows™ permissions | |
---|---|---|
Folder containing the iBase security file and database | All roles | Modify |
Security file | All roles | Read, Write |
Database file | All roles | Read, Write |
Audit log file | All roles | Read, Write |
Role | Minimum Windows permissions | |
---|---|---|
Folder containing the iBase security file and database | All roles | Modify |
Security file | All roles | Read, Write |
Database connection file | Users with Security Administrator role | Read, Write |
All other roles | Read | |
Audit log file | - | - |
Role | Minimum Windows permissions | |
---|---|---|
Folder containing the iBase security file and database | All roles | Modify |
Security connection file | Users with Security Administrator roles | Read, Write |
All other roles | Read | |
Database connection file | Users with both Security and Database Administrator roles | Read, Write |
All other roles | Read | |
Audit log file | - | - |