HP 3000 Manuals

G : Configuring Security [ Information Access Server: Learning the Administrator Utility ] MPE/iX 5.0 Documentation


Information Access Server: Learning the Administrator Utility

G : Configuring Security 

Now that you have defined three more view tables, you need to protect
them from public access by defining table security.  Once security is
defined, you can let PC users back in.

Here's what those PC users will be able to see, depending on whether they
log on as user SALESMGR or user TUTORIAL:

[]
Figure 5-11. What PC Users Will Be Able to See _________________________________________________________ | | | Reference in this Learning manual: | | Lesson 2:I, Configuring Security | | | | References in Information Access Server: Database | | Administration: | | Chapter 8, Configuring Security: | | Adding Table Security by Table | _________________________________________________________ Table Security --------------------------------------------------------------------------------------------- | | | | What You Do | What Happens | | | | --------------------------------------------------------------------------------------------- | | | | G-1. Using what you learned in Lesson 2:I, | | | define table security for all the tables | | | you configured in this lesson: ORDERS, | | | DOLLARS, JOIN-3, and COMPOUND-ITEM. | | | | | | Set up security so that only users in the | | | access group MANAGERS can view these | | | tables. Then leave the Administrator | | | Utility. | | | | | --------------------------------------------------------------------------------------------- | | | | G-2. Type EXIT or E in the Go to screen | The screen clears and an END OF PROGRAM | | field, then press Enter. | message appears. You have exited the | | | Administrator Utility and returned to MPE. | | | | ---------------------------------------------------------------------------------------------


MPE/iX 5.0 Documentation