J
James Franklin
Hi,
Using A2K, I have a database which I want to secure and then split to a
FE/BE solution. I have run the security wizard to secure the database.
However, if I then split the database using the Database Splitter wizard,
the front end is secure, but the back-end can be opened by anyone.
Why does this not remain secure and what is the correct procedure for
securing a split database like this? Do I now separately need to run the
Security Wizard on the backend?
Thanks for any help you can give,
Jim F.
Using A2K, I have a database which I want to secure and then split to a
FE/BE solution. I have run the security wizard to secure the database.
However, if I then split the database using the Database Splitter wizard,
the front end is secure, but the back-end can be opened by anyone.
Why does this not remain secure and what is the correct procedure for
securing a split database like this? Do I now separately need to run the
Security Wizard on the backend?
Thanks for any help you can give,
Jim F.