c:JAM is a security- and user
account-management tool designed to support organizations using Jet
databases such as Microsoft Access or some Visual Basic
applications in organizing their workgroups, authorizing user access and
managing the various datasources. c:JAM specifically facilitates administration
of large and distributed workgroups. Using a two-paned
Explorer-style interface and drag-and-drop operations it's both
intuitive and easy to use. Features include automatic PID and
password generation, change history, connection monitoring, support for VBScript
and JScript macros, user defined event procedures, ActiveX automation and
several maintenance facilities. c:JAM supports Jet 3.x and 4.x file formats and
manages your version 7.0, 8.0, 2000, XP and 2003 databases and workgroup
information files transparently and simultaneously.
One single c:JAM workgroup may include many system databases or workgroup
information files. Perhaps you'd like to organize all of your system databases
as units of one large c:JAM workgroup.
When users of your MS Access applications are spread across various sites,
you may need to manage all user accounts from a central location. But you don't
want your users to have to connect to one central system database over slow WAN
or Intranet links. So group your distributed workgroup files together as a
single c:JAM workgroup. Now you can do account management with a few drag and
drop operations and let c:JAM distribute the results to the various system
Accounts Tree and Database Objectlist window - click to enlarge
c:JAM simplifies management of your MS Access databases
Within c:JAM you use drag and drop to manage user- and group accounts
across bounderies of individual system database files. You don't have to worry
about searching for and be connected to the right workgroup information files,
or to restart MS Access everytime you have to change your current workgroup.
With a few mouse clicks you create new accounts or group memberships. c:JAM
generates the PIDs and passwords automatically according to user defined rules.
c:JAM integrates a lot of utility functions to facilitate your job, such as
securing databases, compressing and repairing all files making up a c:JAM
workgroup, or watching users, who are currently and have been recently connected
to a database.
c:JAM enhances security and transparency
c:JAM presents accounts, memberships and permissions in a clear and intuitive
fashion. See at a glance which groups an user account belongs to, the system
databases or workgroup information files in which this membership is defined and
the permissions regarding any kind of database objects.
c:JAM facilitates documentation. c:JAM records all accounts management
activities. Protocols can be printed out or exported to Access tables for
further processing. c:JAM makes things clear.
Action Protocol window
c:JAM supports large, distributed workgroups
As mentioned above, a c:JAM workgroup may include many system databases. You
might find it useful to manage all of your system databases as one large c:JAM
workgroup. Perhaps you have to split your existing workgroups, because of
increased user counts. Or you have to manage geographically distributed
c:JAM provides a security model for replicated databases
Replicated databases use the same security model as standard databases. It's
up to the administrator to make shure the same security information is available
at each location where a replica is used. There is no replication of the system
database. You have to manually copy the workgroup information files to each
location, overwriting any options, preferences and passwords users have entered.
Or you have to recreate all the user- and group-accounts at each location in the
local system database by entering the same account names with their associated
PIDs manually at each location.
c:JAM's distributed workgroups are the security model of replicated
databases. Within a c:JAM workgroup you drag objects from one unit to another
and don't have to care about PIDs or network connections. Or If you don't
specify units, operations are applied to all the system databases defined in
your workgroup as appropriate.
c:JAM - The solution for your company
IT Departments usually have to deal with a huge number of quick apps built by
LoB's and typically based on office technologies. These applications are often
central to the corporation's day-to-day business but hard to move to a reliable,
scalable and secure production when the number of users grows or users have to
cooperate over LAN bounderies. c:JAM helps IT Professionals transfering
Microsoft Access based quick apps into a secure, scalable and centrally managed