Administering iBase: Administering IBM i2 iBase

Version 9 Release 0

Administering IBM i2 iBase

IBM

SC27-5091-00

Note 1. This edition applies to version 9.0.1 of IBM i2 iBase and to all subsequent releases and modifications until otherwise indicated in new editions. Ensure that you are reading the appropriate document for the version of the product that you are using. To find a specific version of this document go to the IBM i2 iBase documentation. 2. Before using this document and the product it supports, read the information in "Notices" on page 451.

This edition applies to version 9, release 0, modification 1 of IBM? i2? iBase and to all subsequent releases and modifications until otherwise indicated in new editions. ? Copyright International Business Machines Corporation 1991, 2020. US Government Users Restricted Rights ? Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Contents

Chapter 1. IBM i2 iBase administration center........................................................1

Getting started............................................................................................................................................. 1 Creating a security file............................................................................................................................1 Creating an example database...............................................................................................................3 Designing an iBase Database................................................................................................................. 4 Access control........................................................................................................................................ 5 Comparison of Access and SQL Server databases................................................................................ 6 Configuration options for an iBase system............................................................................................ 7 SQL Server clients, servers, and networks.......................................................................................... 11 The example user guide database.......................................................................................................12

Security files, users, and groups............................................................................................................... 13 Security files......................................................................................................................................... 14 Creating users and groups................................................................................................................... 18 Types of group...................................................................................................................................... 33 Security Classification codes............................................................................................................... 41

Create and maintain databases.................................................................................................................43 Create databases................................................................................................................................. 43 Database subsets................................................................................................................................. 53 Creating case-controlled databases....................................................................................................59 Routine maintenance........................................................................................................................... 64 Batch delete......................................................................................................................................... 66 iBase backup policies...........................................................................................................................67 Moving and Copying Databases........................................................................................................... 70 Database schema updates...................................................................................................................75 Common folder objects........................................................................................................................ 77 Checking a database............................................................................................................................ 78 Managing SQL Server databases..........................................................................................................81

Setting Up iBase.........................................................................................................................................87 Configuring alerting.............................................................................................................................. 87 Setting Up Search................................................................................................................................. 90 Auditing.............................................................................................................................................. 116 Bulk import details............................................................................................................................. 134 Scheduling imports and exports........................................................................................................147

Setting up iBase clients........................................................................................................................... 149 Access to folder objects.....................................................................................................................150 Options for opening the database..................................................................................................... 152 Options for identifying matching records.......................................................................................... 153 Location of templates, icons, and other files.................................................................................... 154 Hiding features................................................................................................................................... 155 Installation and application data folders.......................................................................................... 155

External Access Control.......................................................................................................................... 156 Controlling access to Microsoft Access databases........................................................................... 156 Controlling access to SQL Server databases.....................................................................................157 Authenticating connections to SQL Server........................................................................................159

IBM i2 iBase Designer............................................................................................................................. 160 Getting started................................................................................................................................... 160 Creating a New Security File.............................................................................................................. 166 Creating databases............................................................................................................................ 168 Designing a database......................................................................................................................... 178 Managing security.............................................................................................................................. 212 Setting up Word Search..................................................................................................................... 226

iii

Setting up Search 360........................................................................................................................231 Setting up Full-Text search................................................................................................................239 Configuring alerting............................................................................................................................245 Administering iBase........................................................................................................................... 248 Administering a database.................................................................................................................. 255 Working with cases............................................................................................................................ 263 Importing and exporting data............................................................................................................267 Working with categories.................................................................................................................... 292 Glossary.............................................................................................................................................. 334 Managing Access Control........................................................................................................................ 337 Setting up iBase clients......................................................................................................................338 Setting and maintaining user access rights.......................................................................................339 Physical access to iBase Designer.....................................................................................................339 Logical access to iBase (roles)...........................................................................................................340 iBase files on the network (permissions).......................................................................................... 340 SQL Server login and user accounts.................................................................................................. 341 Use iBase with other products...........................................................................................................344 iBase Scheduler....................................................................................................................................... 345 How Scheduler works........................................................................................................................ 346 Installing and configuring Scheduler.................................................................................................347 The Scheduler Log..............................................................................................................................366 Interpreting the Scheduler Log..........................................................................................................367 Scheduler error messages................................................................................................................. 369 iBase database replication...................................................................................................................... 377 Project management..........................................................................................................................377 For iBase administrators....................................................................................................................382 For SQL Server administrators...........................................................................................................431 Setting up the Index Service................................................................................................................... 448 The Index Service configuration installation.....................................................................................448 SQL Server logins and Windows accounts........................................................................................ 448 Logging on.......................................................................................................................................... 449 Configuring an iBase database.......................................................................................................... 449 Checking that the service is configured successfully....................................................................... 450 Managing the index service............................................................................................................... 450 Troubleshooting................................................................................................................................. 450

Notices..............................................................................................................451

Trademarks.............................................................................................................................................. 452

iv

Chapter 1. IBM i2 iBase administration center

Welcome to the IBM? i2? iBase administration center, where you can find information about how to configure and administer IBM i2 iBase. Troubleshooting and support i2 Analyze support page IBM Software Support home page More information IBM Security Learning Academy IBM training

Getting started

To configure iBase for your organization's requirements, you complete various activities that modify its behavior. These activities can affect aspects of the system such as authenticating and authorizing users, controlling access to features, and providing appropriate search options.

To help you to perform these tasks you are provided with a number of administrative tools:

iBase Designer iBase Designer is the primary tool for creating and maintaining databases. For more information, see "Getting started" on page 160.

Audit Viewer You can use the Audit Viewer to view the audit entries for a database. The physical form and location of logs is different for security files, Microsoft Access databases, and SQL Server databases. For more information, see "Auditing" on page 116.

Database Replication For more information, see "iBase database replication" on page 312.

Search Indexer Search 360 indexes are created and updated using the Search Indexer. For more information, see "Setting up Search 360" on page 91.

Database Configuration Utility You use the Database Configuration utility (iBaseConfig) to manage SQL Server settings held in an iBase connection file (whether a security connection file or a database connection file). For more information, see "Managing SQL Server Connection Settings" on page 85.

Scheduler Can be used to schedule import or export jobs at a regular time. For more information, see "iBase Scheduler" on page 345.

Creating a security file

In order to control access to your iBase database, you must create a security file. You use the security file to control who can access the iBase and iBase Designer applications, and any iBase databases secured by the security file.

About this task The first step in designing the security for your iBase system is to create a new security file (.ids file). You always create the security file as an MS Access file but you can choose to convert it to SQL Server format later.

Try to avoid creating multiple security files. You can provide groups with varied but restricted access to many databases secured by the same security file.

To create your own security file, you must first create or choose a folder to hold it. Only one security file can be created in each folder, but you can create subfolders to hold security files if required.

? Copyright IBM Corp. 1991, 2020

1

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download