Phase L. Configuring Item Security [ Information Access Server: Planning and Configuring ] MPE/iX 5.0 Documentation
Information Access Server: Planning and Configuring
Phase L. Configuring Item Security
If you have no item security to add, skip to Phase M.
At this point, you're ready to configure item security by assigning
access groups to items in your configured tables. You can assign as many
as eight access groups to an item. You can leave some of your items as
public items by not assigning any access groups to them. Public items
are accessible by any user who is allowed into the table which contains
the item.
Adding Item Security
---------------------------------------------------------------------------------------------
| | |
| What You Do | What Happens |
| | |
---------------------------------------------------------------------------------------------
| | |
| L-1. Type AIS in the Go to screen field | The Add Item Security (AIS) screen appears. |
| and press Enter. | |
| | |
---------------------------------------------------------------------------------------------
| | |
| L-2. Type an item name, its table name, | The item definition is updated to reflect |
| and an access group name, then press Enter. | the change in security and the Add Item |
| | Security screen clears. |
| | |
---------------------------------------------------------------------------------------------
| | |
| L-3. Repeat Step L-2 until all of your | The Administrator Utility updates the item |
| item security is in place. | definitions to reflect the change in |
| | security. |
| | |
---------------------------------------------------------------------------------------------
| | |
| L-4. Choose Done f8. | The Item Security Menu appears. |
| | |
| If you don't want to check your | |
| configuration of item security, skip to | |
| Phase M. | |
| | |
---------------------------------------------------------------------------------------------
Checking Configuration
---------------------------------------------------------------------------------------------
| | |
| What You Do | What Happens |
| | |
---------------------------------------------------------------------------------------------
| | |
| L-5. Choose Show Security f4. | The Show Item Security screen appears. |
| | |
---------------------------------------------------------------------------------------------
| | |
| L-6. Type an item name and its table name, | The access groups assigned to the item are |
| then press Enter. | listed. |
| | |
| Check to see that this list is complete and | |
| accurate. Use the Delete Item Security | |
| (DIS) and Add Item Security (AIS) screens | |
| to correct any errors. | |
| | |
---------------------------------------------------------------------------------------------
| | |
| L-7. Repeat Step L-6 for all items with | The access groups assigned to each item are |
| security configured. | listed. |
| | |
---------------------------------------------------------------------------------------------
| | |
| L-8. Choose Done f8. | The Item Security Menu appears. |
| | |
---------------------------------------------------------------------------------------------
MPE/iX 5.0 Documentation