M
Manny
Hi,
Joan I think it's you who may have the answer, I have read your steps for
securing a db but what I am confused about is how it works for the split db.
Will both the fe and the be use the same wrkgrp file? I have an app that I
am developing and using security. What I would like clarified is when the
user logs in using a modified short that points to a wrkgrp file on the
network does the be automatically become part of the wrkgrp? I am having
locking problems and it's driving me and my client crazy! So how would the
steps for securing a database be modified when doing an fe/be multi user app?
And finally, I have the package wizard and would like to know if there are
any considerations for creating an install wizard and how will security be
affected on the installed machine.
Of course if anyone could assist I would appreciate it.
Thanks,
Manny
Joan I think it's you who may have the answer, I have read your steps for
securing a db but what I am confused about is how it works for the split db.
Will both the fe and the be use the same wrkgrp file? I have an app that I
am developing and using security. What I would like clarified is when the
user logs in using a modified short that points to a wrkgrp file on the
network does the be automatically become part of the wrkgrp? I am having
locking problems and it's driving me and my client crazy! So how would the
steps for securing a database be modified when doing an fe/be multi user app?
And finally, I have the package wizard and would like to know if there are
any considerations for creating an install wizard and how will security be
affected on the installed machine.
Of course if anyone could assist I would appreciate it.
Thanks,
Manny