Load Ingest Data
Results 1 to 2 of 2

Thread: multiple user for one resource in security

  1. #1
    lsabster is offline Junior Member
    Join Date
    Oct 2006
    Rep Power

    multiple user for one resource in security

    In the NAV binding, in the Machines Tab, if we click on the security button, it only allows for one user to be defined to access one resource.

    What we need is to allow multiple users to access one resource, because we have multiple users with the same job role with different id/password that need to look at the same datasource/resource?

    How can we set this up? Thank you.

  2. #2
    Join Date
    Sep 2006
    Rep Power
    The Security button on the Binding editor is shortcut for editing just the default AIS user called 'NAV'. What you need is simply to define separate user profile for each of the users.

    The setup of user profiles is slightly different when defining a local user profile (e.g. the case when accessing a local workspace using ODBC or OLEDB) or a server based user profile (e.g. to be accessed via a datasource shortcut or via a thin API such as JDBC, JCA or ADO.Net).

    Assuming we want to set up server based user profiles, the process goes something like that:

    1. In the configuration tree, open the server machine on which you want to create the user profile
    2. Right-click the Users entry on the tree and select New User
    3. Enter the name of an existing operating system user.
    4. It is recommended to specify the user's OS password so the passwords stored in the user profile are protected. The password is not saved in the user profile but is used to encrypt the passwords stored in the user profile. If no password is provided, the passwords in the user profile will be encrypted with some fixed internal key - not a safe practice. Note that you cannot give a password that is different than the user's OS password (and if the user's OS password changes, it should be changed in the user profile too)
    5. Once the user profile is set, Edit it and then you can specify authenticators for accessing any of the databases the user needs access to. The authenticators are set per datasource name in the binding and per remote machine name (if remote machines needs to be accessed). If encryption is used, then the key a user will use is also stored in the user profile
    By Dror Harari

    To Find Out more About Attunity Technology:
    Contact Us

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts