MobiLink users

A MobiLink user, also called a synchronization user, is the name you use to authenticate when you connect to the MobiLink server.

For a user to be part of a synchronization system:

  • A MobiLink user name must be created on the remote database.

  • The MobiLink user name must be registered with the MobiLink server.

MobiLink user names and passwords are not the same as database user names and passwords. MobiLink user names are used to authenticate the connection from the remote database to the MobiLink server.

MobiLink user names are always case sensitive unless you are using custom authentication scripts, so the user name provided by the remote database has to exactly match the case of the user name that what was registered in the consolidated database. Keep the following in mind when defining MobiLink user names:

  • In a MobiLink synchronization system, no two user names can be the same except for case   For example, you can have user name aA or user name Aa, but not both.

  • For any given user name, you must always use the same case once you start using it   For example, if you add a user as Aa and synchronize with it, you must continue to synchronize using Aa. Using aA will fail.

When using custom authentication scripts, the script determines the case sensitivity of user names.

You can also use user names to control the behavior of the MobiLink server. You do so using the username parameter in synchronization scripts. See Remote IDs and MobiLink user names in scripts.

The MobiLink user name is stored in the name column of the ml_user MobiLink system table in the consolidated database.

The MobiLink user name does not have to be unique within your synchronization system. If security is not an issue, you can even assign the same MobiLink user name to every remote database.

 UltraLite user authentication

MobiLink user creation and registration
Providing initial passwords for users
Synchronizations from new users
Prompting end users to enter passwords
Changing passwords
Remote IDs
User authentication mechanisms
User authentication architecture
Authentication process
Custom user authentication