Logging in
Once the security model is in place, remove the Read/Write Security right from the Everyone role, Apply the change and close the Security Configuration dialog to initiate security enforcement. The next time the Security Configuration dialog is opened a user will be required to log in. Figure 11.13 shows the login request dialog. Specify a user name and password and click OK.
Figure 11.13. Log In to Change Security Configuration Data
A user may also request to log in from the file menu, bringing up the same dialog as above.
Â
Figure 11.14. Using the File Menu to Log In
Once logged in, the Set Password (Figure 11.11) and Logout options become available.