Setting Up Users
  • 28 Mar 2024
  • 3 Minutes to read
  • Contributors
  • Dark
    Light
  • PDF

Setting Up Users

  • Dark
    Light
  • PDF

Article summary

Note

To establish or modify user profiles, you must be running the Management Center for a local installation of the server. It is not possible to modify user profiles for remote servers.

You can secure your Syniti Replicate environment by creating user profiles with appropriate access permissions to create, manage and modify connections and replications. When you first install and run the Management Center, a Windows service called Server Agent is started automatically and a connection is made between the Syniti Replicate Management Center and the local server (where both Syniti Replicatecomponents were installed.) The default name for this server appears as "local" in the Management Center. From the Management Center, you can set up restricted access to the server via user login IDs and user roles.  Initially, Syniti Replicate is set up with security disabled, thereby avoiding the security mechanism altogether. To enable security and set up user profiles for the local server:

  1. In the Management Center Metadata Explorer, select the local entry, and, from the right mouse button menu, choose Manage Users....

  2. In the User Settings dialog, select the type of security you want to use. 

    Anonymous Access

    Leave this option if you do not want to restrict access to Syniti Replicate in any way.

    UserName Authentication

    Allows you to establish login IDs and passwords for users, but also requires the installation of an X.509 certificate on the client system (where the Management Center is running).

    Windows Authentication

    Syniti Replicate uses your Microsoft Windows login and ID to control access to the Management Center and server agent.

    Certificate Authentication

    Requires the installation of an X.509 certificate but does not allow specific user login IDs.



    For more information on security options in Syniti Replicate, see Server Client Security Options.

    Note

    If you set up a user ID with UserName Authentication, or Certificate Authentication, you will not be able to use Syniti Replicate until the certificate is correctly installed. Generate and install the certificate before setting up authentication.

  3. Select the type of Binding Protocol to use. For more information on appropriate binding protocols for use with Syniti Replicate, see Server Client Security Options.

Authentication

Binding Protocol Options

Anonymous Access

Inactive. Uses TCP/IP binding protocol

UserName Authentication

TCP/IP or HTTP binding protocol. TCP/IP is suitable for intranet access, HTTP is recommended for internet access.

Windows Authentication

Inactive. Uses TCP/IP binding protocol

Certificate Authentication

TCP/IP or HTTP binding protocol. TCP/IP is suitable for intranet access, HTTP is recommended for internet access.

  1. Click Add to open the Create Login dialog.

  2. In the User Definition tab, check the Authentication type in the drop-down menu. Windows Authentication
    This option sets authority for a domain user. The default value in the Login field is the current Windows user login. This value can be edited. The password field is disabled in the dialog because the existing Windows password is expected. User Name Authentication
    This option allows you to set a user name and password that will subsequently be managed by Syniti Replicate.

  3. In the Permissions tab, select a User Role from the drop-down list.
    The pre-defined roles set permissions for the types of operations that user would typically perform. You can customize the permissions for a user by selecting the value for the permission in the list, then choosing True or False from the drop-down list of values. Note that the role automatically becomes Custom in this case.

    Administrator
    Permission for all operations.

    Auditor
    Permission to audit and monitor replications.

    Custom
    Permissions selected manually.

    Note

    For security purposes, you may wish to set the Execute SQL Commands permission to False so that users are not able to run SQL commands other than SELECT from the SQL Query tab.

    Operator
    Permission to set up and change replication settings but cannot work on administrative tasks (such as change license, change user permissions)

    Public
    Permission to audit and monitor replications, back up metadata and change metadata settings (such as starting/stopping traces or changing email parameters for email notification). Security Admin
    Permission to manage security, does not normally need to change replication settings or work on creating new metadata.
    See Create Login Dialog for more information about specific permissions and a comparison of the user roles.

  4. Click Create to create the new  user.

Related Topics

User Settings Dialog

Create Login Dialog

Installing a Certificate

Client and Server Security Options


Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence