Select one of the Security Models listed below. In all models, users are required to know only one user ID and password. Passwords are required for iMIS.
Model 2 is the recommended method.
Security Model |
iMIS User ID/Password |
MS SQL ID/Password |
1 |
JOE/JOEPW |
JOE_[dbname]/hashed value for JOEPW |
2 |
JOE/JOEPW |
JOE_[dbname]_i/imis_systempw |
3 |
JOE/JOEPW |
IMISUSER_[dbname]/imis_systempw |
Note: All passwords are stored as hashed (one-way encrypted) values. Users cannot log in to MS SQL directly by entering their iMIS password.
1: Passthrough
Advantages: Easy to administer; the DBA can tell who owns each process.
Disadvantage: Users with the hashed passwords no longer have full iMIS database permissions outside of iMIS.
2: Parallel Login IDs or Unipassword (recommended)
After you enable the Model 2 option on the SQL Security Models window, two additional fields display: Master Password and Verify Password. To update the SQL Passwords, enter the password, verify it, and select Update All SQL Logins on the iMIS User Passwords window.
Advantages: A user must know the hashed form of the secret password to access the database outside of iMIS; the DBA can tell who owns each process.
Disadvantage: Two sets of iMIS SQL Server login IDs must be maintained.
3: Unilogin
This iMIS system password is defined on the SQL Security Models window. After you enable the Model 3 option, two additional fields display: Master Password and Verify Password. To update the SQL passwords, enter the password, verify it, and select Update All SQL Logins on the iMIS User Passwords window.
Advantages: Easy to administer; a user must know the hashed form of the secret password to access the database outside of iMIS.
Disadvantage: The DBA cannot tell who owns each process.
10.6 Production Release. Updated 3/20/2006 3:04:32 PM
© Copyright by Advanced Solutions International, Inc.
All rights reserved.