Authorization of users |
The program by analogy to Complex DBDM uses technique of access inhibit to unauthorized users to ensure data security. Definition of the rights and restrictions of users is carried out by the system administrator with use of the program pgAdmin (which is included into complete set PostgreSQL). To each user the rights on use of metadata database are assigned. -guest (viewing of the contents of the metadata database, reception of the information - statistical references, tabular and graphic reports); -performer (in addition to the rights of «guests» - the rights to addition of records and formation of applications); administrator (full access, including configuring the structure of tables, definition of users lists, deleting of records and complete cleaning of a database).
The main application window before and after the authorization:
To activate the program execution is allowed to the user with the status "Operator" or "Administrator". At starting the program the operator is offered to enter the information necessary for access to a database: -conventional name of the database server; -login of the registered user; -password of the registered user. The name of the database server, and the login of the last operator who has carried out logon, are stored in the Program ini-file. The password is entered at each entrance. During a session (after successful connection to the metadata base) it is impossible to change the connection. To connect to another database, it is necessary to close the application and repeatedly to activate it. After connecting to the base of metadata the tools to configure parametres of the Program execution become available and lists of available groups for placing the spatial data into DBDM are formed. In a case if at least one of lists is empty (the table of groups is not set up), the program performance is impossible. The table of groups is customized by means of the Complex of maintaining a databank of digital maps. Besides, the table of formats should be customized. At execution of the Program only the data of the registered formats will be exposed to processing! Other files will be ignored.
|