G
Guest
I'm not sure if this belongs here on in the security newsgroup, so please let
me know if this is the wrong place.
We have a replicated database where the master resides on my desktop and a
replica on the network is the "production" application/database. We now have
a need to implement user-level security. Here is what I "think" I want to do,
but I want to do a sanity check here.
1. Synchronize replica with master.
2. (After warning users) Temporarily remove replica from network to prevent
users from changing data.
3. "Unreplicate" the database.
4. Split database (create back-end and front-end).
5. Reimplement replication on back-end. Place replica on network in a
subdirectory of the original network location.
6. Run security wizard on back-end.
7. Synchronize back-ends.
8. Run security wizard on front-end.
9. Reattach front-end to replica on network.
10. Copy front-end to network to original location.
This is the "simplified" version. Actually I plan to kind of do this twice
so I can do a "trial" run to test that all functions work with the new
architecture. If everything worked (ha ha), I would keep the front-end from
the first run to minimize down-time for users.
So, folks, can some of you make suggestions to help bring some sanity to my
approach?
Thanks,
Maredith
me know if this is the wrong place.
We have a replicated database where the master resides on my desktop and a
replica on the network is the "production" application/database. We now have
a need to implement user-level security. Here is what I "think" I want to do,
but I want to do a sanity check here.
1. Synchronize replica with master.
2. (After warning users) Temporarily remove replica from network to prevent
users from changing data.
3. "Unreplicate" the database.
4. Split database (create back-end and front-end).
5. Reimplement replication on back-end. Place replica on network in a
subdirectory of the original network location.
6. Run security wizard on back-end.
7. Synchronize back-ends.
8. Run security wizard on front-end.
9. Reattach front-end to replica on network.
10. Copy front-end to network to original location.
This is the "simplified" version. Actually I plan to kind of do this twice
so I can do a "trial" run to test that all functions work with the new
architecture. If everything worked (ha ha), I would keep the front-end from
the first run to minimize down-time for users.
So, folks, can some of you make suggestions to help bring some sanity to my
approach?
Thanks,
Maredith