Item Security Menu [ Information Access Server: Database Administration ] MPE/iX 5.0 Documentation
Information Access Server: Database Administration
Item Security Menu
You can add item security to a table by assigning one or more access
groups to a specific item in a configured table.
At the Item Security Menu (IS), the menu path you choose will let you add
or delete security to an item in a table, or examine item security
definitions. You change item security with the the Add and Delete
screens as appropriate.
To handle item security definitions:
* Go directly to the screen you want by typing its screen name in
the Go to screen field of any menu and pressing Enter, or
* Choose a function label at the Item Security Menu (IS).
The Item Security Menu looks like this.
______________________________________________________________________________________________
| |
| |
| CONFIG Item Security Menu Screen: IS |
| Choose a function, or type in a screen name and press ENTER. |
| |
| |
| Add Security - Assign an access group to an item. |
| |
| Delete Security - Remove an access group from the list of access groups |
| assigned to an item. |
| |
| Show Security - List all access groups assigned to an item. |
| |
| Done - Return to the Security Menu. |
| |
| |
| |
| |
| |
| |
| |
| Go to screen |
| |
| Add Delete Show Done |
| Security Security Security |
| |
______________________________________________________________________________________________
Adding an Item Security Definition
Add item security to a table at the Add Item Security (AIS) screen.
Table 8-1 describes the fields in this screen.
DBA Capabilities.
If you are the primary DBA, you can add item security for items in all
tables. If you are a secondary DBA, you can add item security only for
items in tables you control.
______________________________________________________________________________________________
| |
| |
| CONFIG Add Item Security Screen: AIS |
| Type in the information and press ENTER. |
| |
| |
| |
| |
| |
| Item |
| |
| |
| Table |
| |
| |
| Access Group |
| |
| |
| |
| |
| |
| |
| |
| Help Done |
| |
| |
______________________________________________________________________________________________
Table 8-1. Add Item Security Screen Fields
--------------------------------------------------------------------------------------------
| | |
| Field | Description |
| | |
--------------------------------------------------------------------------------------------
| | |
| Item | Name of item to which you are adding an access group. |
| | |
--------------------------------------------------------------------------------------------
| | |
| Table | Name of configured table in which the item is found. |
| | |
--------------------------------------------------------------------------------------------
| | |
| Access Group | Name of access group to be allowed to access the specified item. |
| | |
--------------------------------------------------------------------------------------------
Things to Know About Adding Item Security.
When you assign an access group to an item, users in that access group
will only be able to see that item if the table containing the item:
* Has been assigned the same access group using the Add/Delete Table
Security by Table or Add/Delete Table Security by Access Group
screens, or
* Is a public table that is accessible to all users.
If different security is in place at the item level than at the table
level, the item may be inaccessible to anyone.
Users in an access group allowed to access a table, but denied access to
an item in the table, will see a table lacking the entire column in
question.
An item with no access groups assigned to it can be thought of as a
public item (at least within the confines of the table). It can be used
by all access groups that can access the table.
To Add Item Security:.
1. Go to the Add Item Security screen by typing AIS in the Go to
screen field of any menu, or by choosing Add Security f1 at the
Item Security Menu.
2. Type in the item, table, and access group name.
3. To add the item security, press Enter.
The item definition in the data dictionary is updated to reflect
the change in security.
4. When the screen clears, you can assign another access group to
this item or to another item.
5. To leave this screen, choose Done f8. This returns you to the
Item Security Menu. From there, you can go to another screen or
exit the utility.
In addition to using this screen to add item security, you can use the
Add/Delete Table Security by Table (ATST) or Add/Delete Table Security by
Access Group (ATSG) screens to allow or deny access to the table in which
the item is found.
NOTE No more than eight access groups can be assigned to an item.
Deleting Item Security
Delete unwanted item security at the Delete Item Security (DIS) screen.
Impact on PC Users.
Removing an access group from the list of access groups assigned to an
item can have two different effects:
* If the access group being removed is the only access group
assigned to the item, then removing this access group turns the
item into a public item, accessible to all users who have access
to the table in which the item occurs.
* If there are other access groups assigned to the item, then
removing this access group prevents its users from accessing the
item.
DBA Capabilities.
If you are the primary DBA, you can delete item security for all tables.
If you are a secondary DBA, you can delete item security only for the
tables you control.
To Delete Item Security:.
CAUTION Before deleting item security, review your current Access Server
security to make sure you don't inadvertently create a public
item. For example, if ITEM1 in configured table TABLE1 has only
one access group GROUP1 assigned to it, then deleting GROUP1
makes ITEM1 a public item until you assign some other access
group to it. All users with access to TABLE1 will be able to
access ITEM1.
1. Go to the Delete Item Security screen by typing DIS in the Go to
screen field of any menu, or by choosing Delete Security f3 at
the Item Security Menu.
2. Type in the item, table, and access group name and press Enter.
The Administrator Utility updates the item definition to reflect
the change in security.
3. When the screen clears, you can delete additional item security.
4. To leave this screen, choose Done f8. This returns you to the
Item Security Menu. From there, you can go to another screen or
exit the utility.
Examining Item Security Information
Examine information about item security at the Show Item Security (SIS)
screen, shown on the next page.
DBA Capabilities.
If you are the primary DBA, you can examine item security information for
all tables. If you are a secondary DBA, you can examine item security
information only for the tables you control.
______________________________________________________________________________________________
| |
| |
| CONFIG Show Item Security Screen: SIS |
| Type in the information and press ENTER. |
| |
| |
| Item |
| |
| Table |
| |
| Access Groups |
| |
| _____________ _____________ |
| |
| _____________ _____________ |
| |
| _____________ _____________ |
| |
| _____________ _____________ |
| |
| |
| |
| |
| Print Help Done |
| |
| |
______________________________________________________________________________________________
To Show Item Security for a Particular Item:.
1. Go to the Show Item Security screen by typing SIS in the Go to
screen field of any menu, or by choosing Show Security f4 at the
Item Security Menu.
2. Type in the item and table name, then press Enter.
The access groups currently assigned to the specified item are
listed on the screen.
A message is displayed if no security has been defined for the
item.
3. If you want a printout of the item security definition, choose the
Print f1 function label.
This sends a copy to the file ADMLIST, which prints to the default
or other specified printer.
4. To see item security for another item, type in the new item and
table names over the old, then press Enter.
5. To leave this screen, choose Done f8. This returns you to the
Item Security Menu. From there, you can go to another screen or
exit the utility.
MPE/iX 5.0 Documentation