Security and Database Replication

Database replicas use the same security model as all Microsoft Jet databases: Users’ permissions on database objects are determined at the time they start Microsoft Jet and log on. As a developer, it’s up to you to make sure the same security information is available at each location where a replica is used.

You can do this by making the identical workgroup information file available to users at each location where a replica is used. Although the workgroup information file cannot be replicated, it can be manually copied to each location.

Another way to make the same workgroup information file available to all your users is to re-create the entries for users and groups at each location in the local workgroup information file by entering the same user and group names with their associated PIDs at each location. Modifications to permissions are considered design changes and can be made only in the Design Master replica.

Some security permissions control certain aspects of database replication. For example, a user must have Administer permission on the database to:

By default, Administer permission is granted to the Users group, the Admins group, and the creator of the database. If security is to be maintained, you must restrict this permission to selected users.

See Also For more information about replication, see Chapter 7, “Database Replication.”