How security works in a replicated database
Replicate the database, and then replicate the appropriate security file.
- Microsoft™ Access (which cannot be replicated)
- Microsoft SQL Server (a more secure format that can be replicated)
When you select SQL Server format for the security file, you create an SQL Server database that contains the data, and a connection file that stores the connection information. Keep the security connection file in the iBase database folder alongside the connection files for the iBase databases that use it.
Replicating a security file
- Security policy
- User groups
- User accounts
- Access rights derived from membership of the user groups
- Reduced administration for the security administrator as replication synchronizes the security data at the different sites.
- Any security administrator at any site can maintain the security data. You control access to the local copies of the security file in the usual way.
- Usernames and contact details are always consistent and up-to-date, which assists analysts who
use the audit log, record properties, or owner details in iBase.
Non-replicated databases can continue to use a replicated security file, provided the databases are using the same version of iBase.
Why you must replicate the security file
Using a replicated iBase database with an unreplicated security file reduces the security of your system - if you are replicating the database, you must implement a unified and global security system. This is important if users can log on remotely to any server in the iBase system. Local security systems can potentially give users access to different commands and data depending on the server they log on to.
The facility to control who can view the audit log generated by users that work on sensitive data requires you to replicate the security file.
Importance of the security file at the publisher site
All sites must have a copy of the security file or database used at the publisher site because this is the security file associated with the database that is replicated. You can only open this database, or the subscription databases created from it, using the user accounts defined in its replicated security file.
It is not possible for the subscriber sites to create their own security file for use with a replicated database. Each site must either start with a copy of the publisher security file and convert this from Microsoft Access format to SQL Server, or start with a duplicate of the publisher security database created by restoring from an SQL Server backup provided by the publisher site.