返回列表 发帖

ACT! Security Model 4

Database Security


Access to an ACT! database is protected through the use of unique user names which grant users the right to open a database after logging on.
When a user selects to open an ACT! database, the Log On dialog box appears. The user must enter a valid user name to access the database. If the ACT! database administrator has implemented a password policy, the user will also need to enter a valid password.


Database Users
Each person who can access an ACT! database is a “user” of that database. Each user is assigned a user name. The user name is a unique identifier – only one user in any given ACT! database can use that user name. Each user has a contact record (user record) which represents the user in the database. This user record is referred to as “My Record.”


Any user with permission to edit the contact can change the name on the contact record, but only an administrator can change the user name associated with that record.
A user’s log-on status must be active for them to access a database. An administrator can set a user’s log-on access to “inactive” to temporarily restrict that user from opening the database, for example if a user is on vacation or medical leave.

返回列表