home *** CD-ROM | disk | FTP | other *** search
- CH 11 − PASSWORDS AND RELATED MATTERS
- =====================================
- 11.1 Levels of protection
- ==========================
- Powerbase can provide three levels of password protection. None of the
- sample databases has any passwords set, so you may examine the
- password-setting dialogue box which is accessed by choosing Set passwords
- from the Miscellaneous submenu. If passwords have been defined then an
- attempt to open the database leads to a request for a password. This is not
- readable as you type it in; all the characters are replaced by hyphens. If
- Powerbase does not recognize the supplied password it beeps and prints an
- error message in red then prompts for the password to be re-entered. Three
- attempts are allowed, after which Powerbase will shut down.
-
- The lowest password level is Read. It is intended to let users examine the
- database but otherwise keep them out of mischief. A user opening a database
- with the Read password will be allowed to browse and search, examine
- validation tables and print lists, but not much else. Many of the buttons on
- the keypad will be shaded (the same ones as are shaded during printing and
- indexing, in fact) and so are some menu items. In particular, the whole of
- the Miscellaneous submenu is unavailable, thus preventing the user from
- getting at the other passwords!
-
- The next level, Write, allows more operations. Everything on the keypad is
- allowed, including the altering, creation and deletion of records. You may
- also create indices and create and edit validation tables. What you cannot
- do is change passwords or alter the size and structure of the database by
- means of options on the icon-bar menu.
-
- The top level is Manager. At this level you are allowed to set and alter
- passwords, as well as use all the icon-bar menu options. Passwords may be up
- to 10 characters long and are case-specific. Note that when you are setting
- the two lower ones they can be read but the Manager password appears even
- here as a row of hyphens. Take care not to forget it! If no passwords at all
- are set you have full Manager rights so you may ignore the password facility
- altogether if you are the only user of the database.
-
- If you decide to use passwords you may not wish to use all three levels of
- protection and are not compelled to do so. You may set a Manager level
- password only, leaving the other two blank. When you attempt to open the
- database in such circumstances the password-entry window appears because
- Powerbase can’t read your mind and doesn’t know whether you’re the Manager
- and wish to enter your password or whether you’re a lower-level user being
- given limited access without needing a password. If the latter you would
- simply click on Open or type Return, thus entering a null password. This
- would give you Write access. If you set the Manager and Write passwords then
- entering a null password would give you Read access.
-
- It obviously makes no sense to set a low-level password and leave a higher
- level one blank! Powerbase prevents you from doing this in the following
- way. If there is a Read password but no Write password Powerbase makes the
- Read and Write password the same. Similarly, if there is a Write password
- and no Manager password these two are made the same. This means that setting
- only the Read password makes all three identical. You are then admitted to
- Manager level when you enter this password - otherwise you could never get
- Manager level access again! The rule is that when two or more passwords are
- identical you are always given the higher level access when using that
- password.
-
- 11.1.1 Individual I.D.s and passwords
- -------------------------------------
- It is possible to assign a user an I.D. and a personal password, thus giving
- the data even greater protection since access to a specific database can be
- limited to those people who appear on an access-control list. It does not
- seem appropriate, however, to describe the workings of an access-control
- list in a manual for general consumption! Anyone wishing to set up a secure
- database for use by a limited number of specified users is welcome to write
- to Powerbase Support, explaining their requirements. Appropriate
- information will then be provided.
-
- If a database is protected by an access-control list the Access window which
- appears when you attempt to open the database will display two writable
- icons instead of one. The first is for the user’s I.D., the second is for
- the password. Enter both and click on Open. A an error in either the I.D. or
- the password will result in access being denied without informing the user
- which input contained the error.
-
- 11.2 Options selected from the password-setting window
- =======================================================
- As well as the icons for the passwords you will see eight option switches
- which may be used to enable or disable certain features of Powerbase so that
- you can customise your database to some extent. They are placed here so that
- they may only be altered by someone who has Manager rights as that is the
- only access level which allows you to open this window. All switches except
- the last (Log changes) are “on” by default so that all the named features
- are enabled. If you deselect any of these switches the feature concerned
- will cease to operate immediately and will remain inoperative every time the
- database is opened unless you set the switch to re-enable it.
-
- The first four switches determine the availability of the keypad, the
- equivalent function keys, the main menu and the icon-bar menu. All these
- features are enabled by default but you may disable some or all of them in
- order to restrict the actions of other users of the database. This subject
- is treated fully in Ch 14.
-
- The fifth switch determines whether or not the exporting of CSV files and
- subset databases is allowed and the sixth does the same with regard to
- report printing.
-
- 11.2.1 Duplicate primary keys
- -----------------------------
- The seventh switch determines whether the database is allowed to have
- duplicated primary keys or not. As mentioned elsewhere (see 4.5.3) the
- primary key should, ideally, be unique for each record. Sometimes the very
- nature of the data will make it so but, if this is not the case, you can
- enforce primary key uniqueness by deselecting this switch. Any attempt to
- enter a record which would have a primary key identical to one which already
- exists will then result in an error message and the new record will not be
- placed in the file.
-
- If you decide to allow duplicate primary keys (and this is the default,
- remember) you might still want to be warned that such a key is about to be
- created and a switch on the Preferences window allows you to enable and
- disable this feature.
-
- The above refers only to the primary key. Other, subsidiary, keys which are
- generated when you create an index on some other field (see 7.1) are not
- subject to these restrictions and may be repeated many times.
-
- 11.3 Logging database changes
- ==============================
- Selecting the last option switch in the Passwords window causes Powerbase to
- maintain a log which records when the database is opened and closed and
- details of changes made to the records. The following changes are logged,
- details in brackets showing what is recorded in the log file:−
-
- • creation of a new record (primary key of new record)
- • deletion of a record (primary key of record)
- • shifting a record to another subfile (primary key, old and new subfiles)
- • changing a field in a record (primary key, old and new contents)
- • changing a field in a group of records (change, subfile and search formula)
- • creating an index (name of new index)
- • balancing an index (name of index concerned)
- • changing the primary key (former structure of key)
- • reformatting the database (fact only − no details)
- • merging data from another database (source of merged records)
- • importing CSV-type data (source of imported data)
-
- To start a log file select the switch in the Passwords window. The file is
- normally created inside the database directory under the name “Log”
-
- As long as the Log changes switch remains selected the log file will be
- opened whenever the database is opened. The title of the database is
- recorded and the password level at which entry was achieved. This takes the
- form of a number with the following meaning:-
-
- 0 − no password required, 1 − read only, 2 − read/write, 3 − manager
-
- The date and time is also recorded. When you close the database the log
- file is also closed, the date and time being again recorded.