Use iBase with other products

iBase provides a sophisticated security model that controls all aspects of access to the data and functions. iBase users must provide a username and password to enter the iBase system, and determine the level of permissions.

If iBase Extended Access Control is used, some users might be able to read any data, but not add or modify anything; other users might not be able to see specific entity or link types, specific data fields, or individual records.

Consider carefully the folders in which data extracted from iBase in the form of charts, reports, or export files are stored. Ensure that these folders are given appropriate access permissions. After data is outside of iBase, it is potentially exposed to unauthorized access and aspects of the iBase database schema and data can be revealed.
Attention: Data that is taken from an iBase database, in the form of a chart, a report, a map or as an export file for use in a third-party system, is no longer protected by iBase access control.

The security implications of exporting data from iBase for use in other third-party products must always be carefully considered.

Analyst’s Notebook and Chart Reader

Many customers use Analyst’s Notebook with iBase to extend their visualization and analytical capabilities. When using Analyst's Notebook® with iBase, the user can only chart data and include those field values to which they are permitted access in the iBase database. In particular, consideration must be given to data that is exposed in the Analyst's Notebook chart by using cards, attributes, and data records, which might reveal the presence of a particular database field to which the user that creates the chart has access, but which is hidden from other users.

Chart Reader enables chart data, extracted from an iBase database and charted using Analyst’s Notebook, to be shared as a snapshot of the database content with other non-iBase users. Some organizations are happy to send charts as email attachments for browsing using Chart Reader within, or even outside, their organization. However, after is is e-mailed, information tends to disseminate further in unexpected ways. Ensure that iBase data that is exposed in this way complies with your organization’s data distribution and disclosure policies.

iBase GIS Interfaces

When using the optional i2® iBase Geographic Information System Interfaces to plot iBase data on a map, the user can only plot data and transfer those field values into the mapping application to which they are permitted access in the iBase database. Caution should be exercised if it is intended to save the data in a map for sharing with others who may not have the same level of data access permission as the iBase user who originally plotted the data on the map.

Physical security

After extracted from the iBase database and printed as charts, reports or maps, your data is more accessible.

You should review your physical security if the printouts of extracted data are going to be used in parts of your premises that are not usually used by iBase users. Is it permissible for iBase data and details of your iBase database schema to leave your secure working areas? If so, you must plan and restrict how much you do want to reveal.