Preparing existing security files
The publisher and all subscriber sites must start with the same security file or database.
Before you begin
Do not make any changes to the security data at the subscriber sites until replication is configured, for example do not add any groups or users - any changes that you make are lost when replication is configured in SQL Server.
You need to log on as a security administrator or as a system administrator to perform the following steps.
About this task
Using the Security Manager, verify that the user details are correct before you distribute the Microsoft Access security file to the other sites. Although, the security file does not need to contain the names of all the iBase users, it should as a minimum contain the system, database and security administrator accounts for the publisher and subscriber sites. See Managing Security for details.
Procedure
What to do next
Step | Details |
---|---|
Security connection file |
Tell your SQL Server administrator whether you need to replicate the security audit log. After the security connection file exists:
After replication is fully configured, test the replicated security file at each site. |
Database preparation | To continue, review the design of the database as discussed in Updating the Database Design. If no updates are required, see Preparing Existing Databases. |