Configuring Users
From InterBase
Go Up to Working with InterBase Services
Security for InterBase relies on a central database for each server host. This database contains legitimate users who have permission to connect to databases and InterBase services on that host. The database also contains an encrypted password for the user. This user and password applies to any database on that server host.
You can use the TIBSecurityService
component to list, add, delete, and modify users. These are discussed in the following sections.
For more information on InterBase database security, refer to “DataBase Security” in the Operations Guide.
Topics
- Adding a User to the Security Database
- Listing Users in the Security Database
- Removing a User from the Security Database
- Modifying a User in the Security Database