O'Reilly logo

Visual SourceSafe 2005 Software Configuration Management in Practice by Aleksandar Seovic

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the Database

The Windows security for a SourceSafe database is divided across two layers:

  • Windows Shared Folder Security: applied to the shared folders, based on Windows user accounts.
  • Windows NTFS Security: applied to the file system database folders, based on Windows user accounts.

The following diagram shows these layers:

Securing the Database

The most important layer in securing a SourceSafe database is the Windows NTFS Security layer applied to the database folder. This is the only way to assign strict access permissions to the users that must access the database files. The security of SourceSafe databases is determined by the security of the folder that contains ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required