Installation and Configuration – CDRv5 Client
Understanding Database Ownership
Each CDRv5 Database has an "owner" computer. The owner computer is the only computer that can update the database with new CDR and CPM records. Other computers can only use the database for query purposes. The owner computer can also perform database administration tasks such as defining new users.
Understanding Database Security
The MS-SQL security model supports Database security, Operating System security, or mixed mode (both). Your database administrator would have setup the security model when the MS-SQL Server was installed. The CDRv5 Client software supports all MS-SQL security models.
However, it is important to understand that the application will use a "mirror” username in its own security model.
In other words, the CDRv5 Users table will have a user entry with a user name identical to the OS username. This is the name that is used by the CDRv5 application to manage the application privilege and access. The database can also be shared with other users by adding their username in the CDRv5 Database Users table. The actual database access must also be configured to authorize a user to access the database.
In summary, the security is a two step process: 1) authorize a domain user to access MS-SQL server using its own security configuration and 2) configuring the CDRv5 Database Users table to allow access to its data.
No Video Available Currently