Hi -
Serious problem over here. I have, for example, a source safe database with one user (named "aaa" configured to use it. Under Source Safe admin, I give this user check in/out acces.
Now what happens when this person tries to check things in/out: windows will access the database folders (and shadow folders if applicable) and try to update files using the account name of the person currently logged into the network at the moment (in our case, "aaa". So this network account must have read/write access to the database folder.
My question is - what is stopping the user from going through DOS or Explorer, and deleting the database directory? Can I prevent this somehow?
Please answer ASAP. Thank you.
Serious problem over here. I have, for example, a source safe database with one user (named "aaa" configured to use it. Under Source Safe admin, I give this user check in/out acces.
Now what happens when this person tries to check things in/out: windows will access the database folders (and shadow folders if applicable) and try to update files using the account name of the person currently logged into the network at the moment (in our case, "aaa". So this network account must have read/write access to the database folder.
My question is - what is stopping the user from going through DOS or Explorer, and deleting the database directory? Can I prevent this somehow?
Please answer ASAP. Thank you.