Managing security
Managing security in a replicated database is similar to an unreplicated database. However, the security file must be SQL Server format.
Replication ensures that your iBase security setup is identical at all sites. When you are using a replicated security file, any change that is made by a security administrator at one site is replicated to all the other sites, whether adding or modifying user groups, defining permissions for those groups, or adding or modifying users. Updates are replicated to all the sites at a frequency that is agreed with the SQL Server administrator and might, for example, be anything from every minute to once a day.
If one site requires slightly different security arrangements, you must set up user groups and users that are site-specific.
Each analyst should have their own user account, and any naming convention for these should include a location identifier in the user name. See Updating User Data for details.
iBase system roles
Tasks | Required permissions |
---|---|
Work with the security file and set up groups and users | You need to be able to log
on as a security administrator. Your user account must be a member of a group with the security
administrator system role. This enables you to:
|
Initialize a database for replication and use the options on the
Replication menu Note: Allows you to display but not review
conflicts |
You need to be able to log on as a database
administrator. Your user account must be a member of a group with the database administrator system
role. This enables you to:
Note: You also need permission to access the SQL Server conflict tables in the database.
Contact your SQL Server administrator if you cannot display the Conflict Viewer but appear to have
the correct iBase permissions. |
Use the Conflict Viewer to review conflicts | Your user account must be a
member of a group with the database administrator system role, and also have add, update, and delete
permissions for entity and link records, including entity and link records created by other
users. Note: You also need permission to access the SQL Server conflict tables in the database.
Contact your SQL Server administrator if you cannot display the Conflict Viewer but appear to have
the correct iBase permissions. |
Change database properties | You need to be able to log on as a system administrator. Your user account must be a member of a group with both the security administrator and database administrator roles. |
Maintaining System Commands Access Control (SCAC) groups
- In the Microsoft Access security file before you distribute the security files to the subscriber sites.
- In the publication database, either before or after the security file is configured for replication.
- In the subscription database, after replication is configured for the security file at the subscriber sites.
Group | Notes |
---|---|
Soft Delete | Denies users access to the commands for purging and restoring soft deleted records. These commands are only available in the publication database, after all current conflicts are resolved. |
Batch Modification | Denies users access to Batch Edit and Batch Delete which, when used especially on entities with large numbers of links, can introduce conflicts into your data. This group also denies access to Merge Entities. Conflicts arising from merging cannot be handled in the iBase Conflict Viewer and must therefore be avoided by good working practices. See Merging Entities for details. |
Show User Information |
Denies access to the User Information and Select User dialogs. This is
available in the following places:
Note: If this group is not displayed in the System Commands Access Control dialog, update the SCAC
groups by selecting Update Command Groups from the Tools menu.
|
Maintaining Data Access Control groups
- In the Microsoft Access security file before you distribute the security files to the subscriber sites, if the publication database exists. However, you are not able to deny access based on Security Classification Code lists as these are a feature of SQL Server databases.
- In the publication database, either before or after the security file is configured for replication, if the publication database exists.
- In the subscription database, after replication is configured for the security file at the subscriber sites, if the subscription database exists.
If a particular group of users at one site requires different permissions to similar users at another site, then you need to assign their user accounts to a separate Data Access Control group.