HP 3000 Manuals

Worksheet 2: Access Group Definition [ Information Access Server: Planning and Configuring ] MPE/iX 5.0 Documentation


Information Access Server: Planning and Configuring

Worksheet 2:  Access Group Definition 

Access Group Definition 

[]
Figure 1-2. Labeled Diagram of Configuration Worksheet 2 Objective. The primary DBA or secondary DBA uses this worksheet to arrive at the definitions of access groups, of the PC users who will belong to them, of secondary DBAs, and of the IMAGE, file, and view tables each access group will be able to use. Worksheet Description. At the top of the worksheet are spaces for the ACCESS GROUP NAME (A), the CAPABILITY (B) of the access group, and the DATE (C) you defined the access group in the Administrator Utility. Table 1-0. (cont.) Seven columns are provided for the definitions of Access PC users belonging to the access group: (D) USER NAME The name you want to give the Access PC user. The name you enter in Access PC can be up to 16 characters long and must begin with an alpha character followed by any combination of alphanumeric characters and/or hyphens. (Access Server upshifts alpha characters in this field.) (E) PASSWORD The password (optional) you want to give the user. If you provide a password, it, too, can be up to 16 characters long and must begin with an alpha character followed by any combination of alphanumeric characters and/or hyphens. (Upper and lower case are significant in the assignment of passwords.) (F) MT The maximum number of result tables this user can save on the host HP 3000. You might put UNLMT in this column if you don't want to set a limit. (G) MS The maximum number of disc sectors this user's saved tables can occupy on the disc drives connected to the host HP 3000. You can put UNLMT if you don't want to set a limit. (H) PQ The MPE priority of the user's server process. The default is CS, the normal priority for interactive processes. DS is a lower priority and ES is lower still. (I) DBA Designates an optional secondary DBA. Put an X (or any printable character) in this column next to any user to be configured as a secondary DBA. (Only the primary DBA can configure a secondary DBA.) (J) REMARKS A column for any additional information about this user. (Unlike most other columns, these remarks are not part of the user definition and are not recorded in the data dictionary.) The PC user's full name might go here, for example. Or, since there need not be a one-to-one correspondence between user names and real people, you might indicate which people are using which user name. Eight columns are provided for the definitions of configured tables accessible to users in this access group: (K) TABLE NAME The name you assign to each configured table being described. Table names can be up to 16 characters long and must begin with an alpha character followed by any combination of alphanumeric characters and any of these characters: + - * / ? ' # % & @. (In naming tables, keep in mind any limitations on table names in the applications your PC users plan to use with data saved from Access Server.) (L) TT The table type. IM represents an IMAGE table (a table derived exclusively from one IMAGE dataset). F represents a table derived exclusively from one file. V represents a view table (a table derived from one or more previously configured tables). Table 1-0. (cont.) (M) PT Indicates whether the table is a public table. Because no access groups are assigned to it, a public table can be accessed by any Information Access user. A No in this column means you'll need to configure table security for this table. (Note: A table can be a public table and still have item security on selected items. Keep track of item security in the Description column.) (N) ITEM LIST The names of the items contained in the table. A configured table can have up to 64 items (columns). For IMAGE tables, the Add IMAGE Table screens provide an easy way to include all items from a dataset, so you may not need to list all the items here in that case; the same is true for file tables. (O) OP For view tables, the kind of operation required to configure the table. J3, for example, might mean three tables are JOINed to create the view table. For a view table derived from one IMAGE table, you might use an N to mean no special operation is required. (P) DATABASE OR FILE The name of the IMAGE database or file the item on the same line is associated with. (Q) DATASET The name of the IMAGE dataset the item is derived from. The name of the file is in the previous column. (R) DESCRIPTION A place to describe anything noteworthy about the item, or to refer to a more detailed definition of the view table in Worksheet 3. To Plan for Access Groups and Users:. 1. Use your results from Worksheet 1 to estimate the number of access groups you want to configure. For each access group, make one copy of Worksheet 2. 2. On each worksheet, fill in an appropriate name and capability for the access group. 3. For each user you want in the access group, create a user name and password. You may want to leave the saved-table capability columns (MT and MS) blank until you've conferred with your System Manager. Indicate which users, if any, have been or will be designated as secondary DBAs. 4. Based on what you learned from Worksheet 1 about these users' data needs, define the IMAGE, file, and view tables for each access group. For complex view tables, list the table name, briefly summarize the rest of the information about the table, and refer yourself to Worksheet 3 for its complete definition. Once you've completed Worksheet 2 for each access group, you'll have all the information required to configure access groups, users, tables (except view tables), and table and item security. If you plan to define view tables, use Worksheet 3.


MPE/iX 5.0 Documentation