HP 3000 Manuals

Phase L. Configuring Item Security [ Information Access Server: Planning and Configuring ] MPE/iX 5.0 Documentation


Information Access Server: Planning and Configuring

Phase L. Configuring Item Security 

If you have no item security to add, skip to Phase M.

At this point, you're ready to configure item security by assigning
access groups to items in your configured tables.  You can assign as many
as eight access groups to an item.  You can leave some of your items as
public items by not assigning any access groups to them.  Public items
are accessible by any user who is allowed into the table which contains
the item.

Adding Item Security 

---------------------------------------------------------------------------------------------
|                                             |                                             |
|                 What You Do                 |                What Happens                 |
|                                             |                                             |
---------------------------------------------------------------------------------------------
|                                             |                                             |
| L-1.  Type AIS in the Go to screen field    | The Add Item Security (AIS) screen appears. |
| and press Enter.                            |                                             |
|                                             |                                             |
---------------------------------------------------------------------------------------------
|                                             |                                             |
| L-2.  Type an item name, its table name,    | The item definition is updated to reflect   |
| and an access group name, then press Enter. | the change in security and the Add Item     |
|                                             | Security screen clears.                     |
|                                             |                                             |
---------------------------------------------------------------------------------------------
|                                             |                                             |
| L-3.  Repeat Step L-2 until all of your     | The Administrator Utility updates the item  |
| item security is in place.                  | definitions to reflect the change in        |
|                                             | security.                                   |
|                                             |                                             |
---------------------------------------------------------------------------------------------
|                                             |                                             |
| L-4.  Choose  Done  f8.                     | The Item Security Menu appears.             |
|                                             |                                             |
| If you don't want to check your             |                                             |
| configuration of item security, skip to     |                                             |
| Phase M.                                    |                                             |
|                                             |                                             |
---------------------------------------------------------------------------------------------

Checking Configuration 

---------------------------------------------------------------------------------------------
|                                             |                                             |
|                 What You Do                 |                What Happens                 |
|                                             |                                             |
---------------------------------------------------------------------------------------------
|                                             |                                             |
| L-5.  Choose  Show Security f4.             | The Show Item Security screen appears.      |
|                                             |                                             |
---------------------------------------------------------------------------------------------
|                                             |                                             |
| L-6.  Type an item name and its table name, | The access groups assigned to the item are  |
| then press Enter.                           | listed.                                     |
|                                             |                                             |
| Check to see that this list is complete and |                                             |
| accurate.  Use the Delete Item Security     |                                             |
| (DIS) and Add Item Security (AIS) screens   |                                             |
| to correct any errors.                      |                                             |
|                                             |                                             |
---------------------------------------------------------------------------------------------
|                                             |                                             |
| L-7.  Repeat Step L-6 for all items with    | The access groups assigned to each item are |
| security configured.                        | listed.                                     |
|                                             |                                             |
---------------------------------------------------------------------------------------------
|                                             |                                             |
| L-8.  Choose  Done  f8.                     | The Item Security Menu appears.             |
|                                             |                                             |
---------------------------------------------------------------------------------------------



MPE/iX 5.0 Documentation