Subject Re: [IBO] Which is the best method to implement security?
Author Geoff Worboys
> I'm starting with Firebird and I'm trying IBO trial. I'm planning
> the application (use Delphi 6) and I need a good ideas to how
> implement the security at user level.

This is not specifically an IBO question, first you must understand
IB/FB security. So RTFM...

IBObjects Related:

- The IBO online help - available where you downloaded IBO.
(Also: http://www.ibobjects.com/ibodownload.html )

- The release notes (distributed in the IBO Source as
ReleaseNotes.rtf)

- FAQ and Tech Sheet information at www.ibobjects.com

- Getting Started Guide:
http://www.ibobjects.com/ibo_gsg.html


Interbase/Firebird Related:

- The firebird website: http://firebird.sourceforge.net/
(see links to "Documentation" and "Novice's Guide").

In particular most people should download and have as reference
the IB6Beta documentation available from:
http://firebird.sourceforge.net/index.php?op=doc&id=userdoc


Other Useful Sites:

- IBPhoenix: http://www.ibphoenix.com/

- Claudio Valderrama's resource site: http://www.cvalde.com/

- Ivan Prenosil's site: http://www.volny.cz/iprenosil/interbase/


> 1) is it ok to implement the security creating user in firebird
> database?
> 2) is it good choice to use role?
> 3) how can implement the security on form? For example, only certain
> user can see a particular button or other object.

I think the standard response to this sort of question is; "How long
is a piece of string?" IOW there is no useful answer, it depends on
your situation and how important security is to your application.

IB/FB security is not great, is generally OK for internal networks but
dont rely on it for information open to the web unless the information
is not of great importannce.

Roles can be good and useful things, but make sure you understand them
(and do some experiments) before getting too far into your application
design.

There are various things you can do to extend, enhance or adjust IB/FB
security (see Samples/Survey for an example of the
"LoginUsernamePrefix" capability of TIB_Connection). But whether any
of the known possibilities are appropriate to your requirements I have
no way of knowing. Hopefully the above links will give you some
ideas.


--
Geoff Worboys
Telesis Computing