This section describes how to plan out your security system for DBF table security. It’s a good idea to think through user access and table/field rights before you start creating security profiles.

Follow these general steps to set up a protected database system for DBF tables:

  1. Plan your user groups.

  2. Plan each user’s access level.

  3. Plan each table’s privilege scheme, including both table privileges and field privileges.

  4. Implement your security scheme (see Setting up your DBF table security system).