Phase K. Configuring Table Security [ Information Access Server: Planning and Configuring ] MPE/iX 5.0 Documentation
Information Access Server: Planning and Configuring
Phase K. Configuring Table Security
At this point, you're ready to configure table security by assigning
access groups to IMAGE, file, and view tables. There is virtually no
limit to the number of access groups you can assign to a table. If you
like, you can make some of your tables public tables by not assigning any
access groups to them.
Adding Table Security
---------------------------------------------------------------------------------------------
| | |
| What You Do | What Happens |
| | |
---------------------------------------------------------------------------------------------
| | |
| K-1. Type ADTST in the Go to screen field | The Add/Delete Table Security by Table |
| and press Enter. | (ADTST) screen appears. |
| | |
---------------------------------------------------------------------------------------------
| | |
| K-2. Type a table name and press Enter. | A list of all access groups appears. |
| | |
---------------------------------------------------------------------------------------------
| | |
| K-3. Type an X next to the names of the | The Administrator Utility updates the table |
| access groups you want to assign to the | definitions to reflect the change in |
| table and then press Enter. | security. |
| | |
---------------------------------------------------------------------------------------------
| | |
| K-4. Choose Done f8. | The Table Security Menu appears. |
| | |
| If you don't want to check your | |
| configuration of table security, skip to | |
| Phase L. | |
| | |
---------------------------------------------------------------------------------------------
Checking Configuration
---------------------------------------------------------------------------------------------
| | |
| What You Do | What Happens |
| | |
---------------------------------------------------------------------------------------------
| | |
| K-5. Choose Show by Table f3. | The Show Table Security by Table screen |
| | appears. |
| | |
---------------------------------------------------------------------------------------------
| | |
| K-6. Type a table name and press Enter. | The access groups assigned to the table are |
| | listed. |
| | |
| Check to see that this list is complete and | |
| accurate. Use the Add/Delete Table | |
| Security by Table (ADTST) screen to correct | |
| any errors. | |
| | |
---------------------------------------------------------------------------------------------
| | |
| K-7. Repeat Step K-6 for all tables with | The access groups assigned to each table |
| security configured. | are listed. |
| | |
---------------------------------------------------------------------------------------------
| | |
| K-8. Choose Done f8. | The Table Security Menu appears. |
| | |
---------------------------------------------------------------------------------------------
MPE/iX 5.0 Documentation