Database and SQL Server Settings
You must specify the name of the database in SQL Server that will be used to store the DeviceLock Enterprise Server data. The default name suggested by the wizard is DeviceLockDB.
There are two ways to define a connection to SQL Server:
a. ODBC Driver - you enter the name of SQL Server in SQL Server name and select the authentication mode (Windows or SQL Server).
The SQL Server name parameter must contain not just the name of the computer where SQL Server is running but the name of SQL Server itself. Usually the SQL Server name consists of two parts: the computer name and the instance name divided by a backslash (e.g. computer\instance). Sometimes the instance name is empty (default) and you can use the computer name as an SQL Server name. To retrieve SQL Server names available in your local network, press the Browse button. (You should have access to the remote registry of the SQL Server machine to retrieve the instance name.)
If the SQL Server name parameter is empty, it means that SQL Server is running on the same computer as DeviceLock Enterprise Server and has an empty (default) instance name.
To establish a connection to SQL Server, you must also configure authentication parameters.
Select the Windows authentication option to authenticate on SQL Server under the account used to run DeviceLock Enterprise Server's service.
If the service is running under the SYSTEM user and SQL Server is located on the remote computer, service will not be able to connect to SQL Server since the SYSTEM user doesn't have a right to access the network. For more information on how to run DeviceLock Enterprise Server on behalf of the user, please read the description of the Log on as parameter.
Select the SQL Server authentication option to allow SQL Server to perform the authentication itself by checking the login and password previously defined. Before selecting the SQL Server authentication option, make sure that your SQL Server was configured to use mixed-mode authentication.
Enter the SQL user name (login) in Login name and its password in Password.
NOTE: Windows Authentication is much more secure than SQL Server Authentication. When possible, you should use Windows Authentication.
b. System Data Source - you select the predefined system data source from the Data Source Name list.
To define data sources, use the Data Sources (ODBC) applet from Control Panel -> Administrative Tools.
If, in the data source configuration, SQL Server Authentication was chosen, then you also need to specify the SQL user name (login) in Login name and its password in Password. If Windows Authentication was selected, then you should leave these fields blank.
To refresh the Data Source Name list, press the Refresh button.
When connection to SQL Server is defined you may want to test it. Press the Test Connection button to make sure that all the parameters were specified correctly.
Please note that it only checks connectivity and your access rights to SQL Server. If there are problems with the database or your access rights to this database, you don't see those problems in the Test Connection dialog box.
Store shadow files in SQL Server
There are two modes of storing binary data: data can be stored in SQL Server or it can be stored on the disk.
To store data in SQL Server, check the Store shadow files in SQL Server flag.
If you decided to store binary data in SQL Server, we recommend that you dramatically increase the maximum file size parameter for the transaction log of the database specified in Database name. Otherwise, SQL Server may fail to handle the large amount of data (hundreds of megabytes) in one transaction. Also, it is recommended that you increase the maximum amount of memory available for SQL Server and turn on the PAE (Physical Address Extension) feature.
To store data on the disk, uncheck the Store shadow files in SQL Server flag. In this case only links to the binary data and some additional information are stored in SQL Server.
When stored on the disk, data files are located by the path specified in the Store path parameter. To choose the folder where files should be stored, you can use the Browse button.
You can also specify the network shared resource (e.g. \\server\dlstore) that will be used as storage. Make sure that the user account used to run the DeviceLock Enterprise Server service has full access to this network resource.
NOTE: It is recommended to store binary data on the disk.