Next: 5. SQL Terminal
Up: Ovrimos version 3.0 On-line
Previous: 3. Ovrimos Components
Subsections
4. Database Manager
4.1 Overview
Database Manager has an HTML-based interface and allows the user dbman to:
- start up, shut down and connect to a database
- create, configure and delete a database
- change the dbman password
- view the error log file of a database
- view the error log file of Database Manager
- edit the Serial Number and License of the version which has been installed
- provide SSL through the Certificate Manager
- configure Database Manager
- view the on-line documentation
Additionally, it allows any database user to connect to the Ovrimos Web site and get
for free a Serial number for 5 concurrent connections, valid for two months.
You can perform all the above tasks on Database Manager's home page, clicking
the relevant text link or button.
Note: For better results it is recommended that you use the Ovrimos navigation
options (back, forth, etc.) instead of your browser's.
Figure 4.1 shows Database Manager home screen after installation. Initially, only
testbase exists.
Figure 4.1:
Database Manager home screen. The DBMan Configuration and Certificate Manager
options do not appear in non-secure versions.
|
4.2 Starting and Stopping Database Manager
Starting and Stopping Database Manager differs for Unix and Windows users.
Starting and Stopping Database Manager for Unix users
To start Database Manager:
If you chose to install Ovrimos in the boot sequence during installation, Database Manager starts automatically.
Otherwise:
To stop Database Manager:
- Make sure that no databases are currently running.
- Run <Ovrimos root dir>/bin/.dbmandown
Starting and Stopping Database Manager for Windows users
Database Manager is installed as a service in Windows NT and it is started automatically every time
the system is booted. Users may have to stop and then restart Database Manager if they configure
it for SSL. In this case, Database Manager must be restarted for the configuration to take effect. See
4.4 for more details.
To start Database Manager:
Use the Services icon of the Control Panel and start Ovrimos DBMan or
open a Command Prompt window and type net start dbman in the command line.
To stop Database Manager:
User the Services icon of the Control Panel and stop OvrimosDBMan or
open a Command Prompt window and type net stop dbman in the command line.
4.3 Accessing Database Manager
All tasks performed on Database Manager require authentication except of
Register and get 5 concurrent connections and
Certificate Manager. When you are prompted for a
User Name and Password ,
type dbman and
pass , correspondingly.
The password is case sensitive and the maximum number of password characters is 60.
It is also possible that one more password may be required from you if you have set
security control via certificates. See 4.5.(Certificate Manager) for more details
on this issue.
To access Database Manager:
- Use your favorite browser and enter the URL for Database Manager:
http://<servername>|localhost:<Database Manager port number>/
<servername>: enter either the name of the computer with the installed product or its IP address.
It may also be localhost if Database Manager is running on the user's computer.
<Database Manager port number>: Database Manager listens to 2956.
In the process of using Database Manager you will notice that 2956 is the initial Database Manager port. As
soon as any kind of authorization is required and given, the port changes to 9000.
- Alternatively, open the start.htm which has been created by the installation
program and can be used as a shortcut to Database Manager, if Ovrimos is running on the user's
computer.
4.4 Database Manager and SSL
This and the following few sections refer to SSL (Secure Socket Layer). Users concerned with
security issues may have to read carefully through this part of the chapter before proceeding to
database creation. Others, who are not so interested in security at this point, may skip
sections 4.4(Database Manager and SSL) through 4.6(Database Manager Configuration) and
proceed to section 4.7.
Database Manager has been enhanced to support SSL-based network security for both Database Manager and the
databases it handles.
Security in Ovrimos is guaranteed by asymetric algorithms, used for the issuing and
verification of certificates. A Certificate Manager is provided for the issuing
of certificates.
At the same time Database Manager can be configured to provide security to the databases. You may
decide on the degree of security provided when you configure Database Manager. See also 4.6.
4.5 Certificate Manager
The Certificate Manager can be accessed through the Web interface of Database Manager. Ovrimos Certificate Manager
is a tool that:
- Manages Local Certification Authorities and the certificates they issue.
Locally managerd Certification Authorities (LCAs for short) can be
- 1.
- self-signed.
- 2.
- certified by another LCA.
- 3.
- certified by an External CA (ECA for short) and inported into the
Certificate Manager. See 4.5.6 for details about this procedure.
- Create and Manage Server Certificates. These can be
- 1.
- certified by an LCA.
- 2.
- certified by an External CA (ECA) and imported into the Certificate Manager.
- Create and Manage Client Certificates. These can be certified by an LCA. Their
private keys are generated and stored on the client computer by either
- 1.
- Netscape Navigator
- 2.
- Internet Explorer
- 3.
- openssl or similar tools
- Import certificates issued by external certification authorities. These fall into
four categories:
- 1.
- Certificates for Local CAs, where the private key has been generated
by Ovrimos, and the certificate was issued by an external CA.
- 2.
- Certificates for Servers, where the private key has been generated
by Ovrimos, and the certificate was issued by an external CA.
- 3.
- Certificates and External CAs, which Ovrimos may later be configured to trust.
- 4.
- Server Certificate-Key combinations, which have been obtained with
procedures outside of Ovrimos, but which Database Manager would like Ovrimos to be able to use.
Figure 4.2 shows the Certificate Manager home screen. For better understanding of the
sequence required for setting up the certificate authority and using certificates, the
following subsections will describe the steps (in chronological order) required to
make a secure database management system.
Figure 4.2:
Certificate Manager home screen
|
The first step that ensures security is to place a request for Certificate Authority.
This request may be either self-signed, as we will see later, or it may be submitted
to another authority for signing it.
Ovrimos Certificate Manager allows the placing of a request for Certificate Authority. By obtaining
a Certificate Authority you are able to issue certificates for the database server and
for the database clients. You can see details about the philosophy of CAs in 13.5.1.
Figure 4.3 shows the Certificate Signing Request form. Requesters will have
to fill-in the form fields.
Figure 4.3:
New Certificate Authority Signing Request
|
Description of the form:
Common Name: The name of the Certificate Authority that will appear
on the certificates, e.g Ovrimos CA.
E-Mail Address: The mail address of the Certificate Authority. It is
absolutely necessary to provide a valid mail address for this field.
Organizational Unit: The organization department, e.g. R&D.
Organization Name: The name of the organization.
Locality:, State or Province:, Country: City, State
and Country where the dbman resides.
Key Length: The length of the encryption key. It ranges between 512 to 4096 bits.
It is recommended to choose a short key for client certificates.
After submitting the request, you may see the Request Details, as figure 4.4 shows.
Figure 4.4:
Certificate Authority Signing Request Details
|
If you wish for a server to be able to use SSL for communicating with clients, you have
to obtain a server certificate for it.
Server certificates are used by the clients for authenticaing the server.
Figure 4.5 shows the server request form.
Requesters will have to fill-in the form fields.
Figure 4.5:
New Server Certificate Request Form
|
Common Name: The name of the host computer where the server resides. It is
necessary to provide a correct full path computer address, e.g.
station5.develop.company.com.
Notice that when connecting to a server, its name must be specified exactly as
it appears on the certificate, or else the client will not authenticate the server.
For example, connecting to moon.yourdomain.com will succeed, but connecting
to moon will cause problems with authenticating the server, even though both
host name specifications in reality correspond to the same machine. If a machine has
more than one name or address, the same warning applies.
You may use an IP address in a dotted decimal format.
E-Mail Address: The mail address. Normally, this will be the mail address
of the person who accesses the Ovrimos database server.
Organizational Unit: The organization department, e.g. R&D.
Organization Name: The name of the organization.
Locality:, State or Province:, Country: City, State
and Country where the Ovrimos database server is established.
Key Length: The length of the encryption key. It ranges between 512 to 4096 bits.
It is recommended to choose a medium length key for the database server.
After pressing the OK button, the request is submitted to the Certificate
Authority. Is is not issued yet. The certificate will be issued later by the
Certificate Authority.
The next step for providing security is to place a request for the clients'
certificates. A client is the physical person who is the Database Manager (dbman). This
certificate will be used every time a secure action is required by Database Manager if the
configuration requires a certificate.
Ovrimos users may have already obtained personal certificates for use in
email, or may do so and have them signed by an ECA. Here, we explain how a user
can obtain personal certificates for Netscape Nevigator signed by an LCA.
Figure 4.6 shows the Client Signing Request Form for Netscape. Requesters
will have to fill-in the form fields. A similar form will have to be filled by
Microsoft Explorer clients.
Figure 4.6:
New Client Signing Request Form
|
Common Name: The name of the person who will be the dbman.
E-Mail Address: The mail address of the dbman. It is absolutely
necessary to provide a valid mail address for this field.
Organizational Unit: The organization department, e.g. R&D.
Organization Name: The name of the organization.
Locality:, State or Province:, Country: City, State
and Country where the Ovrimos database server is established.
Key Length: The length of the encryption key. It ranges between 512 to 4096 bits.
It is recommended to choose a medium length key for the database server.
To submit the application request you have to press the OK button. If there
are no other certificates issued for the client's browser, i.e. if this is the
first time a certificate is requested, then the browser will ask for a password. This
password will be used consequently every time the certificate is required.
Please make sure that you remember your password because there is no way to retrieve
this password from the browser.
The process of placing requests for a client certificate may be repeated as many times
as necessary. The private key that will be used for the encoding is made on the
client side.
Note! Client requests have nothing to do with database users. As
already mentioned above, a client is a dbman.
You may click on the Certificate Requests to see the pending certificate
requests. Figure 4.7 is an example of certificate requests after making
three different kinds of requests, a CA request, a Server request and a Netscape Client
request.
Figure 4.7:
Certificate Requests
|
You may Revoke Request or Self-Sign a request. Certificates are valid
for a limited number of days. Only CA requests may be self-signed.
The rest of the requests will have to be
signed by a Certificate Authority. To begin the process of signing certificates, you
either have to self-sign your CA or import a CA from another source. Then you may use
this CA to sign the rest of the pending applications through
Local Certification Authorities.
You may also decide on a different CA or an external CA. In this case, the steps are:
another LCA: An LCA signed by another LCA is also simple
to set up.
- 1.
- Follow the Local CAs link.
- 2.
- Choose the LCA that will sign the CSR.
- 3.
- Press the CA Actions button.
- 4.
- Choose the new CSR. The CSRs that await signing are
under the heading Unsinged Requests.
- 5.
- Enter the amount of days for which the new certificate
will be valid.
- 6.
- Press the Sign button. If all goes well, a certificate
for the new LCA is signed by the chosen LCA.
an external CA: Different external CAs have different
procedures and requirements for signing certificate requests. The
paperwork is likely to be the most time-consuming part of the
process. On the technical side, the External CA, should be able
to accept a PEM-encoded PKCS request and give back to the
applicant a PEM-encoded PKCS certificate.
- 1.
- Follow the Requests link.
- 2.
- Click on the icon next to the new CSR. The details of the
CSR will appear.
- 3.
- Follow the View Certificate Request. A page displaying
the PEM-encoded CSR will appear.
- 4.
- Using your GUI's Copy & Paste facility or otherwise
take the certificate request (including the special
start and end lines) and hand it to the external CA according
to the instructions they give you. After you have
done everything the ECA asks you to, they will prepare
the certificate and allow you to somehow obtain it in
a PEM-encoded format.
- 5.
- Follow the Import link.
- 6.
- Paste the PEM-encoded certificate (including the special
start and end lines) into the big text area.
- 7.
- Press the OK button. If all goes well, you will be able to
use your new externally-signed LCA.
Local Certification Authorities presents you with a list of CAs which exist for Ovrimos.
As mentioned before, these may be self-signed or imported authorities. Figure
4.8 is an example of two existing CAs.
Figure 4.8:
Local Certification Authorities
|
After choosing one of the Local Certification Authorities, and clicking on
CA Actions, you may see the details Certification Authority, as in
figure 4.9.
Figure 4.9:
Certificate Authority and Signer Details
|
Notice in figure 4.9 that the Certificate Details and the Signer Details
are the same, because the certificate is self-signed.
The certificate must be installed in your browser before you are allowed to use it.
To install the certificate, click on
Install Certificate in your Browser.
Figure 4.10 shows the Certificates Issued by the
previously chosen Certificate Authority and as well as the
Unsigned Certificate Requests.
Figure 4.10:
Unsigned Certificate Requests
|
For every certificate request you wish to have signed, you may choose it by
its radio button and click on the Sign button. You may also determine the
number of days the certificate will remain valid. By default, certificates are valid for
one year (365 days). As soon as a certificate is signed, Certificate Manager shows the new
cituation, as in figure 4.11.
Figure 4.11:
Signed and Unsigned Certificate Requests
|
The signing of certificates may continue until all the pending requests are cleared
and signed.
Notice the icons on the left of the Certificate header. They are different for
the Server and the Client (browser) certificates. By clicking on the icon you may see the
certificate details. Figure 4.12 is an example of a client certificate
signed by the Ovrimos CA.
Figure 4.12:
Client Certificate Details
|
Notice that since this is not a self-signed certificate, the Certificate Details are
different from the Signer Details.
Cient certificates have to be installed to the browser
before being used. To install a client certificate ypu have to be in the
Viewing Details screen and to press the
Install Certificate in your Browser.
To see what certificates you have installed, you will have to choose the Security
selection from your browser.
Figure 4.13 is an example of client certificates, installed in
Netscape.
Figure 4.13:
Viewing Certificates from Security
|
You may also use the selection Get a Certificate to obtain a Netscape certificate
or Import a Certificate to import a certificate issued by another user.
Certificates may also be exported. In this case, another user can import a certificate.
4.5.6 Importing a Certificate
As already mentioned, certificates do not have to be issued by the Local
authorities. They may be signed by another Authority.
If you choose to import a certificate, you must use the Import selection
of Certificate Manager. The dbman username and a password will be required.
4.6 Database Manager Configuration
Up to this point, the certificates have been requested, signed and installed, but no
actions of securing Database Manager or the subsequently created databases have been made. Only
by configuring Database Manager one sets the security level and determines the kind of
authorization that will be required for using Database Manager. So, after
creating all necessary certificates, you will have to proceed to Database Manager
configuration. The dbman username and password will be required.
Database Manager user name is dbman, while the original password is pass.
Figure 4.12 shows Database Manager configuration form. Notice that the HTTP Port
is now 9000, because authorization has been required.
Figure 4.14:
Database Manager Configuration
|
Many of the configuration parameters shown in figure 4.14 are described also
in A.2.1(Global Parameters).
Section Main Parameters shows the HTTP Port, which is by default 9000,
since authorization has been required, the CA E-mail and Mail Server and the product version.
The following section, which is the SSL Security Level allows you to set the security
level to any of the following:
None. No SSL is used.
Export. This is the security level supported by browsers outside the US.
Low, Medium, High. Increasingly higher levels of security
Section DBMan SSL Credentials. If more than one server certificate is
issued, you may choose which server will be considered secure by the clients.
Section Authentication allows you to choose the kind of certification required for
further access of Database Manager. There are four possible choices:
Username-Password, Client Certificate and
Client Certificate AND Username-Password.
The default choice is Username-Password. If a Client Certificate
is required, then instead/besides the dbman username and password, the password
of the Client Certificate will be required.
Finally, in section Trusted CAs you may choose one or more of the Certificate
Authorities, whose certificates you accept.
After configuring Database Manager you will have to shut it down and restart it in order for
the updates to be incorporated into the running process.
See 4.2.(Starting and Stopping Database Manager) for details about how to stop
and restart Database Manager in your operating system.
4.7 Starting up and Shutting down a Database
To start up a database, click the respective Status button. When a database is up and
running, its name is changed to an HTML link one can click to connect to it. After having connected
to it, a Web page appears which provides users with navigation options, such as links to Roadmap,
SQL Terminal and Administrator Console. Figure 4.15 shows the Introductory Database Screen.
Authentication is required for starting up and shutting down the database. In both cases,
the User Name is dbman with initial Password pass.
If Database Manager requires a client certificate, you will have to provide the certificate password.
Figure 4.15:
Introductory Database Screen
|
To shut down a database, click the Status button. Unix users can also shut it down
by running $TEMPDIR/.sqldown.
4.8 Database Creation
When you create a database, a number of directories and files are also created. These are listed and
explained below. (Refer to section A.2.2 to view the parameters associated
with them.) It should be
noted that the system tables are not generated until the database is started for the first time.
- Database Directory: we use this term to refer
to the database home directory .
- Backup Directory and Log File:
the backup files (stored in the Backup Directory)
and the transaction log file are used in case of abnormal termination (refer to
section 12.2 about Database Recovery). It is recommended that you place them on a different
volume for safety reasons (protection from media failure).
- Temporary Directory: the temporary tables and
data are stored in this directory.
- AGI Directory: developers can use their favorite
language (i.e. C/C++, Java, Perl)
to write executables or scripts which are stored in this directory. These programs/scripts are
called stored procedures and can be invoked by an application program (refer to section 10.5).
- HTTP Root Directory: the database-specific, external Ovrimos Web resources are
stored in this directory (refer to section 8.3).
- HTTP Log File: the HTTP server's record of HTTP requests (refer to
section 8).
- Replicator Directory .
The directory where the replicated data will be kept. (Refer to chapter11).
4.8.1 How to create a database
Figure 4.16 shows the initial screen for database creation.
Figure:
Initial Database Creation Screen. The Replicator Directory field does not
appear in non-replicator versions.
|
- 1.
- Enter a unique database name.
- 2.
- Fill in the Database Directory
field, a unique, valid path. When you leave this
field, all the remaining fields related to the database directories and files (formerly
listed) will be filled in automatically.
- You can modify the location of each directory and file as needed, but you
must keep in mind that all the directories must be non-existent at creation time, i.e.
you can neither use the same directory for any two database subdirectories, nor use
an existing directory for any such purpose.
- For safety reasons (protection from media failure), it is strongly recommended
that you place the Backup Directory
and Log File on a different volume.
- The AGI Directory, HTTP Root Directory and
HTTP Log File can be left blank (although Database Manager proposes directory pathms
for them). However, if you do not make these directories at creation time, you cannot
create them later.
- The Replicator Directory is the directory where the replicated data will
be kept.
- 3.
- Set the encryption options. Data can be stored in encrypted form so that anyone with no
official rights who tries to access it will see just an unintelligible jumble of bits
(refer to User-provided ciphers E.1).
- 4.
- Click OK to create the database.
- 5.
- Proceed to the database configuration to modify the database parameters, if necessary (refer
to section 4.9).
4.9 Database Configuration
Database Configuration may appear to be intimidating to a first-time user. However, you
need not worry about setting these parameters. Most are set automatically by Database Manager
and, unless there is a conflict on your system, you need not modify them.
Database configuration parameters fall into the following categories:
- SQL Server Parameters
- HTTP Server Parameters
- Password Parameters
- Fine Tuning Parameters
- Miscellaneous Parameters
- SSL Security Level
- Database SSL Credentials
- Authentication
- Trusted CAs
NOTE: Parameters that have already appeared in Database creation, are not explained here
(see section 4.8).
Reference: Global and database specific parameters are described in section A.2. |
4.9.1 SQL Server Parameters
Figure 4.17 shows the SQL Server Parameters.
Figure 4.17:
SQL Server Parameters. The Replicator Port and Replicator Directory
fields do not appear in non-replicator versions.
|
- SQL Port: port used for SQL connections. Database Manager assigns
a unique SQL Port for each database. You may wish to note down this number for using it
with remote database connections.
See Database Parameters in section A.2.2 for information on the range
of values.
- Replicator Port: port used for
connections from remote
replicators. Database Manager assigns a unique Replicator Port for each database.
See Database Parameters in section A.2.2 for information on the range
of values. See also 11.(Replication) for more details on the process of
data replication.
- Shared Memory Key: shared memory lets two or more processes share a memory
segment. However, multiple processes sharing a piece of memory have to coordinate its use among
themselves.
- Semaphore Key: semaphores are mainly used to synchronize the access to shared
memory segments.
- Pre-Ovrimos 2.6 Clients Only:
check this box if you want to use the database only
with pre-Ovrimos 2.6 clients. This option need not concern new Ovrimos users.
A database set for pre-Ovrimos 2.6 clients is affected in the communication with
these clients (SQL Query Tool is such a client application). In this case it may serve
only applications written with older drivers. Internal data representation is not
affected, therefore this option may be set or unset at any time.
4.9.2 HTTP Server Parameters
Figure 4.18 shows the HTTP Server Parameters.
Figure 4.18:
HTTP Server Parameters
|
- HTTP Port: port responding to HTTP requests.
See Database Parameters in section A.2.2 for information on the range
of values.
- HTTP Session Timeout: the maximum period of time,
in minutes, that an HTTP session (for example, a session with SQL Terminal) is allowed to
remain idle before the server terminates the session. It is suggested that users keep this
time period short when they have purchased few concurrent connections.
- Character Set: Character Set of text transmitted by the
HTTP server so that browsers are able to interpret them correctly. Some examples are provided
in section B.10.
- Scheme Handlers: this file includes the Scheme scripts'
mappings to URLs (Refer to section 8.5.2).
- Scheme Library File: before executing user scripts, the embedded Scheme
interpreter is initialized from this file (refer to section 8.5.2).
- Executable Extensions: refer to section 8.5.4.
- MIME Types File: this file includes the MIME types corresponding to each file
extension.
4.9.3 Password Parameters
Figure 4.19 shows the Password Parameters for database users.
Refer to section 13.4.2 to view relevant information about Password Policy.
Figure 4.19:
User Password Parameters
|
4.9.4 Fine Tuning Parameters
These parameters may be editted according to the user's special needs. The dbman
will determine after some trials which values suit each database, depending on its needs.
- SQL Fibers: refer to section 7.2.4.
- HTTP Fibers: refer to section 7.2.4.
- REPLICATOR Fibers: refer to section 7.2.4.
- Lock Wait Times: it specifies the number of times a
connection is allowed to be put to sleep and awakened before it quits trying to acquire a lock.
- Total B-Trees: B-trees are a special type of balanced search trees used widely to
implement database indices. This parameter defines the total number of simultaneously opened B-trees
corresponding to the database's indices. However, the number of B-trees that can be simultaneously
open depends on the operating system's capacity for handling them. Total B-Trees are calculated on
this basis: 2 B-trees for locks, 1 B-tree per primary key constraint, 1 B-tree per unique
constraint, 1 B-tree per index, 1 B-tree per query with ORDER BY which doesn't use any of
the existing ones, 1 B-tree per query with UNIQUE.
- Cached B-Tree Nodes:
the maximum number of B-tree nodes that the cache can hold.
- Cached Tables: the maximum number of permanent and temporary base tables that the cache can
hold.
- Physical Page Size: the physical size (in bytes) of the operating system's page.
This is operating system dependent and cannot be changed by Database Manager. It is shown here for
information purpose only.
- Mapped Region Size: by taking advantage of the
operating system's memory-mapping
file I/O mechanism, Ovrimos maps file regions to memory and users define their number.
The physical size of each file region equals to the size of the operating system's page.
- Mapped Regions Per Table: the maximum number of mapped regions corresponding to
each base table (permanent or temporary).
4.9.5 Miscellaneous Parameters
- Host Name: in the case of hosts with multiple IP addresses, the user can specify
one to bind to. Instead of an IP address, a hostname can be specified if it unambiguously
corresponds to a single IP address. Blank or the asterisk (*) means that all IP addresses are bound.
- MailServer: the name of the outgoing mail server used for admin's mail
notification (refer to Chapter 6).
Figure 4.20:
Miscellaneous Parameters
|
4.9.6 SSL Parameters
SSL parameters are set for secure databases.
Figure 4.21:
Secule Socket Layer
|
- SSL Security Level.
The SSL security Level may be set to None, in which case no SSL exists.
Otherwise, the Export level is used for databases outside the US, while the
rest of the levels, i.e. Low, Medium, High, provide
increasingly higher security levels.
- Database Credentials.
You may choose the trusted server.
- Authentication.
You may decide on the authentication required for the database users. The default
authentication requires Username-Password. It is not wise to set Client Certificate
at creation time, since the database is not yet created, users do not yet exist, and
the database admin does not have a mail address, which will be required for user
certification. Later, once the users are created, you may update users and add them
a mail box. You can then reconfigure the database and require authentication via
certificates.
- Trusted CAs
You may choose one or more Trusted CAs.
All these parameters are also discussed in A.2.2.(Database Parameters)
4.10 Database Deletion
Database deletion is possible only when the database is shut down. To delete any directory or file,
click the checkbox of a specified option and then click OK to confirm deletion.
Figure 4.22 shows the database deletion screen.
Figure 4.22:
Database Deletion
|
Important: If you click the checkbox of the option Delete Database Directory, all the
directories and files located under it will also be removed. Thus, to avoid accidental deletion of
data, you should check the contents of the Database Directory before confirming its deletion.
4.11 Changing the dbman password
As explained in section 4.3, all tasks performed on Database Manager require authentication as
user dbman. To modify the password for this user, click the respective text link on Database Manager's
home page.
Figure 4.23 shows the Change Password screen. For security reasons, the
password characters are not echoed back.
In case a problem arises as a result of some change you have made to the dbman password,
follow these steps:
- shut down all databases and stop Database Manager.
- set the $DBMANPASSWD to the value which corresponds to the
initial password pass (refer to section A.2.1).
- login again with password pass.
Figure 4.23:
Change Password Screen
|
4.12 Editing the serial number and license
A serial number identifies you as a registered Ovrimos user.
A separate license number determines the number of concurrent connections you have purchased.
Serial number and license are edited in the form accessed by clicking the respective text link on
Database Manager's home page. Make sure that all existing databases are shut down before editing these numbers.
Depending on how you use Ovrimos (trial or licensed use), read carefully the relevant
instructions, to determine which number you should edit.
Figure 4.24 shows the Edit dialog box.
Figure 4.24:
Editing Serial Number and License
|
Trial use of Ovrimos
- 1.
- Registered users: they either get a free license for 5 concurrent connections for two
months or a free license for 1 connection for an unlimited period of time.
- (a)
- If you have downloaded Ovrimos from http://www.ovrimos.com, you should register at
http://www.ovrimos.com/regprod.html
Alternatively, you can register when you access the home page of Database Manager.
By doing so, a unique serial number is sent to you via email. To get the 5 concurrent
connections, edit only the serial number in the respective form.
- (b)
- If you have the product on a CD, you are also provided with a list of available serial numbers and
licenses for all the supported platforms. To get the 5 concurrent connections for two months,
edit the serial number, corresponding to your system's platform.
To get the 1 connection for an unlimited period of time, edit both the serial number and the
license.
- 2.
- Unregistered users: they get a free license for 1 connection for two months.
Licensed use of Ovrimos
- New License:
At the time of Ovrimos License purchase, a unique serial number and a license number are
assigned to you. To be able to use the purchased concurrent connections, you should edit both the
serial and license numbers.
- Expansion of License:
When you expand your License, you are given a new license number which specifies the number
of the concurrent connections you have in total - including those you acquired through expansion
of the License. The serial number you have already been assigned (at the time of your first purchase)
is also valid for your total concurrent connections. Thus, you should edit your old serial number
and the new license number which will be sent to you via e-mail.
4.13 Database Manager Error Log
Like most Database Manager actions this one is also performed in a secure mode, thus you will
notice that port is set to 9000 as soon as the selection Database Manager Error Log is requested.
Events such as Starting Database Manager and possible errors are registed in the error log.
Next: 5. SQL Terminal
Up: Ovrimos version 3.0 On-line
Previous: 3. Ovrimos Components