Database Administrator's Guide

Previous Topic

Next Topic

FairCom DB Access Configuration

One of the main responsibilities of a FairCom DB Server Administrator is to establish and maintain access to the FairCom Server. Although reviewing this chapter is not required for operating the FairCom Server, FairCom recommends Administrators consider the following features.

Access to the FairCom Server can be controlled in four basic ways:

User access restrictions

Requiring User ID and/or User password to access the FairCom Server.

File access restrictions

Requiring file password to access a file.

File operation permissions

Controlling which specific operations (e.g., read, write, delete) a given class of users can perform on a particular file they have accessed.

Group-based restrictions

Defining groupings, then assigning users to given groups and giving appropriate file permissions only to members of a specific group.

The details of access and security control through user, file, and group information are covered in this section. Basic concepts needed to understand security operations are covered first. Descriptions of the Administrator Utility used to enter security information for the FairCom Server and monitor users while they are connected to the FairCom Server follow.

Note: The controls discussed here are those available to the Administrator. Applications can also be programmed to allow certain security controls (e.g., change file passwords) to users who have appropriate access to the FairCom Server, using available security functions in FairCom’s FairCom DB API. Consult application documentation or application vendor for further login instructions.

It is important to be aware that the file security provided by the FairCom Server is a function of access to files through the FairCom DB Server. When files are not controlled by the FairCom Server, they may not be secure.

FairCom DB File and User Security are available only when using the client/server operational model.

In This Chapter

Users, Files, Groups, and File Permission Masks

Advanced Data Encryption