You can create push or named pull subscriptions for iBase security data. Unless specified
below, always accept the default options for the subscription (notice that there are no conflicts
for SQL Server to resolve in this type of iBase database).
Before you begin
Before you can start, the iBase administrator should have already created iBase security
databases on the Subscribers. These can contain some data but the data is overwritten by the initial
snapshot.
Procedure
- Create a subscription and select the following options for the
subscription:
- The Subscriber does not have the schema and data and should therefore be
initialized.
- Depending on the subscription type, set the Merge Agent to initialize
the subscription immediately (optional).
- The Merge Agent should continuously check for updates.
- The subscription is a client subscription type
- Verify that the initial snapshot is applied. For example, check that a rowguid column is
added to one of the tables included in the publication, such as the _User
table.
- Test that replication is working correctly for the new subscription. Use the
_User table for this purpose:
- At the Subscriber, in the _User table, add a
user.
- After the change is merged, check the corresponding row in the
_User table at the Publisher.
- At the Publisher, delete the user you added.
- After the change is replicated, check the corresponding row in the
_User table at the Subscriber.
- Set the polling interval for the Merge Agent to the required frequency. See Setting Up the Merge Agents.
- Restrict access to the tables in the SQL Server database. See the Administration Center
document Managing Access Control, for details. The information in this document applies to all types
of iBase database.
Note: The iBase administrator who created this database might already have a suitable SQL Server
login as they are the database owner but you might need to add the logins for any other
administrators to the database.
- Back up the databases.
For more information, see:
- Tell the iBase administrator that the security data at the Subscriber is configured for
replication.