Configuring Users

From InterBase
Jump to: navigation, search

Go Up to Working with InterBase Services


Security for InterBase relies on a central database for each server host. This database contains legitimate users who have permission to connect to databases and InterBase services on that host. The database also contains an encrypted password for the user. This user and password applies to any database on that server host.

You can use the TIBSecurityService component to list, add, delete, and modify users. These are discussed in the following sections.

For more information on InterBase database security, refer to “DataBase Security” in the Operations Guide.

Topics

Advance To: