home *** CD-ROM | disk | FTP | other *** search
- =====================================
- Ch 11 − Passwords and related matters
- =====================================
-
- 11.1 Levels of protection
- ----------------------------
- Powerbase provides three levels of password protection. None of the sample
- databases uses passwords, so you may examine the password-setting dialogue
- box which is accessed by choosing Set passwords from the Miscellaneous
- submenu. If passwords have been defined then an attempt to open the database
- leads to a request for a password. This is not readable as you type it in;
- all the characters are replaced by hyphens. If Powerbase does not recognize
- the supplied password it beeps and prints an error message in red then
- prompts for the password to be re-entered. After three failed attempts
- Powerbase will shut down.
-
- The lowest password level is Read. It is intended to let users examine the
- database but otherwise keep them out of mischief. A user opening a database
- with the Read password will be allowed to browse, search and print lists
- (unless debarred as described in 11.2), but not much else. In fact it will
- be found impossible to place the caret in a field. The function keys won’t
- work, many of the buttons on the keypad will be inactive and some menu items
- will be shaded. In particular, the whole of the Miscellaneous submenu is
- unavailable, thus preventing the user from getting at the other passwords!
-
- The next level, Read/write, allows more operations. Everything on the keypad
- is allowed, including altering, creating and deleting records. You may
- create indices and create and edit validation tables. What you cannot do is
- change passwords or alter the size and structure of the database by means of
- options on the iconbar Utilities menu.
-
- The top level is Manager. At this level you are allowed to set and alter
- passwords, as well as use all the iconbar menu options. Passwords may be up
- to 10 characters long and are case-specific. Note that when you are setting
- the two lower ones they can be read but the Manager password appears even
- here as a row of hyphens. Take care not to forget it! If no passwords at all
- are set you have full Manager rights so you may ignore the password facility
- altogether if you are the only user of the database.
-
- If you decide to use passwords you might not wish to use all three levels of
- protection and don’t need to do so. You may set a Manager level password
- only, leaving the other two blank. When you attempt to open the database in
- such circumstances the password-entry window appears because Powerbase can’t
- read your mind and doesn’t know whether you’re the Manager and wish to enter
- your password or whether you’re a lower-level user being given limited
- access without needing a password. If the latter you would simply click on
- Open or type Return, thus entering a null password. This would give you
- Write access. If you set the Manager and Read/write passwords then entering
- a null password would give Read access.
-
- It obviously makes no sense to set a low-level password and leave a higher
- level one blank! Powerbase prevents you from doing this in the following
- way. If there is a Read password but no Write password Powerbase makes the
- Read and Write passwords the same. Similarly, if there is a Write password
- and no Manager password these two are made the same. This means that setting
- only the Read password makes all three identical. You are then admitted to
- Manager level when you enter this password - otherwise you could never get
- Manager level access again! The rule is that when two or more passwords are
- identical you are always given the higher level access when using that
- password.
-
- 11.1.1 Individual I.D.s and passwords
-
- It is possible to assign a user an I.D. and a personal password, thus giving
- the data even greater protection since access to a specific database can be
- limited to those people who appear on an access-control list. It does not
- seem appropriate, however, to describe the workings of an access-control
- list in a manual for general consumption! Anyone wishing to set up a secure
- database for use by a limited number of specified users is welcome to write
- for information to Powerbase Support, explaining their requirements.
-
- If a database is protected by an access-control list the Access window which
- appears when you attempt to open the database will display two writable
- icons instead of one. The first is for the user’s I.D., the second is for
- the password. Enter both and click on Open. A an error in either the I.D. or
- the password will result in access being denied without informing the user
- which input contained the error.
-
- 11.2 Options selected from the password-setting window
- ---------------------------------------------------------
- As well as the icons for the passwords you will see eight option switches
- which may be used to enable or disable certain features of Powerbase so that
- you can customise your database to some extent. They are placed here so that
-
- - 52 -
-
- they may only be altered by someone who has Manager rights as that is the
- only access level which allows you to open this window. All switches except
- the last (Log changes) are ON by default so that all the named features are
- enabled. If you deselect any of these switches the feature concerned will
- cease to operate when you click on Set and will remain inoperative every
- time the database is opened unless you set the switch to re-enable it.
-
- The first four switches determine the availability of the keypad, the
- equivalent function keys, the main menu and the iconbar menu. All these
- features are enabled by default but you may disable some or all of them in
- order to restrict the actions of other users of the database. This subject
- is treated fully in Ch 14.
-
- The fifth switch determines whether or not the exporting of CSV files and
- subset databases is allowed and the sixth does the same with regard to
- report printing.
-
- 11.2.1 Duplicate primary keys
-
- The seventh switch determines whether the database is allowed to have
- duplicated primary keys or not. As mentioned elsewhere (see 4.5.2) the
- primary key should, ideally, be unique for each record. Sometimes the very
- nature of the data will make it so but, if this is not the case, you can
- enforce primary key uniqueness by deselecting this switch. Any attempt to
- enter a record which would have a primary key identical to one which already
- exists will then result in an error message and the new record will not be
- placed in the file.
-
- If you decide to allow duplicate primary keys (and this is the default,
- remember) you might still want to be warned that such a key is about to be
- created and a switch on the Preferences window allows you to enable or
- disable this feature. You can also make Powerbase print a list of duplicate
- primary keys (see 10.7).
-
- The above refers only to the primary key. Other, subsidiary, keys which are
- generated when you create an index on some other field (see 7.1) are not
- subject to these restrictions and may be repeated many times.
-
- 11.3 Logging database changes
- --------------------------------
- Selecting the last option switch (Log changes) and clicking on Set opens a
- log inside the database directory. Powerbase will then record when the
- database is opened and closed and details of changes made to the records.
- The following changes are logged, details in brackets showing what is
- recorded in the log file:
-
- • creation of a new record (record number & primary key)
-
- • deletion of a record (record number & primary key)
-
- • shifting a record to another subfile (record no., primary key,
- old and new subfiles)
-
- • changing a field in a record (record no., primary key,
- old and new contents)
-
- • changing a field in a group of records (change, subfile and
- search formula)
-
- • creating an index (name of new index)
-
- • balancing an index (name of index concerned)
-
- • changing the primary key (former structure of key)
-
- • reformatting the database (fact only − no details)
-
- • merging data from another database (source of merged records)
-
- • importing CSV-type data (source of imported data)
-
- As long as the Log changes switch remains selected the log file will be
- opened whenever the database is opened. The title of the database is
- recorded and the password level at which entry was achieved. This takes the
- form of a number with the following meaning:
-
- 0 − no password required, 1 − read only, 2 − read/write, 3 − manager
-
- The date and time are also recorded. When you close the database the date
- and time are recorded again and the log file closed.
-
- The log file is a plain text file and is always called Log. Although the
- default location for the file is inside the database directory you may start
- a log somewhere else by dragging the small text-file icon next to the Log
- changes switch to a directory display. When you release the mouse button
- the password window is closed just as if you’d clicked Set and logging is
- enabled. An advantage of this method is that you may perform the same drag
- to the same directory from many different databases and have them all use
- the same log. The !Scrap application is a possible location for a general
- log of this kind.
-
- - 53 -