iBase files on the network (permissions)

The iBase security file and database are managed through the security (.ids) and database (.idb) files.

For Microsoft™ Access format security files and databases, the .ids and .idb files contain all the data in the iBase system (apart from the audit log data held in the .idl file). However, when you use the SQL Server format security file and databases, these files contain only the information that is required to connect to the SQL Server instance and databases. All other data is stored within the SQL Server databases.

For successful operation of iBase, all users need the ability to create and delete files in the folder that contains the security file and database. This is because iBase creates and deletes multi-user lock files in this folder.

It is important for both access control and normal system management that users are prevented from deleting the security (.ids) and database (.idb) files. You should apply security settings to these folders and files to prevent this.

The access permissions that are required on the iBase security file and database depends on whether Microsoft Access or SQL Server is in use for storing the data:

  • It is necessary for iBase to write to the Access format security file whenever a user logs in to the security file because a Microsoft Access format security file contains the Security Audit log.
  • When an SQL Server format security file is used, iBase only needs to write to the Microsoft Access connection file when the database properties or connection details are changed. This operation can be performed through iBase Designer or the Database Configuration utility by an iBase user with both the Security Administrator and Database Administrator roles only.

The following tables detail the permissions necessary on the folder, security file, and database files for the various configurations and roles in the iBase system.

Table 1. Microsoft Access security file and databases

Configuration 1 - Microsoft Access security file and databases:

  Role Minimum Windows™ permissions
Folder containing the iBase security file and database All roles Modify
Security file All roles Read, Write
Database file All roles Read, Write
Audit log file All roles Read, Write

Table 2. Microsoft Access security file and SQL Server databases

Configuration 2 – Microsoft Access security file and SQL Server databases:

  Role Minimum Windows permissions
Folder containing the iBase security file and database All roles Modify
Security file All roles Read, Write
Database connection file Users with Security Administrator role Read, Write
All other roles Read
Audit log file - -
Table 3. Microsoft SQL Server security file and databases

Configuration 3 – Microsoft SQL Server security file and databases:

  Role Minimum Windows permissions
Folder containing the iBase security file and database All roles Modify
Security connection file Users with Security Administrator roles Read, Write
All other roles Read
Database connection file Users with both Security and Database Administrator roles Read, Write
All other roles Read
Audit log file - -