Logging in with Schema Viewer
Once the security model is in place, remove the Read/Write Security right from the Everyone role, Apply the change and close the Security Configuration dialog to initiate security enforcement. The next time the Security Configuration dialog is opened a user will be required to log in. Figure 11.13 shows the login request dialog. Specify a user name and password and click OK.
Figure 11.13. Log In to Change Security Configuration Data
A user may also request to log in from the file menu, bringing up the same dialog as above.
Figure 11.14. Using the File Menu to Log In
Once logged in, the Set Password (Figure 11.11) and Logout options become available.