Setting up a Security Store allows you to specify the database where you want the security information stored. This step is required in order to use Role based security.
...
For IBMi connections, the schema name must be the name of a new schema. Entering (To use an existing Security Store see the section below) Entering the name of a schema that already exists will result in the following message:
...
Also, for IBMi connections, when the security store is set up the system will set up the tables in the schema to be journalled. Journalling is required for the security store when using an IBMi connection.
Info | ||
---|---|---|
| ||
Using an Existing Security StoreThe Security Store configuration information is stored in a file in the instance folder called securitystore.config.json. If you have an existing security store that you would like to use for a new instance you can do so by creating or updating this file. The format of the JSON in the file is shown below.
The location you specify must already contain a valid Security Store created using the process described above.
|