Worksheet 2: Access Group Definition [ Information Access Server: Planning and Configuring ] MPE/iX 5.0 Documentation
Information Access Server: Planning and Configuring
Worksheet 2: Access Group Definition
Access Group Definition
Figure 1-2. Labeled Diagram of Configuration Worksheet 2
Objective.
The primary DBA or secondary DBA uses this worksheet to arrive at the
definitions of access groups, of the PC users who will belong to them, of
secondary DBAs, and of the IMAGE, file, and view tables each access group
will be able to use.
Worksheet Description.
At the top of the worksheet are spaces for the ACCESS GROUP
NAME (A), the CAPABILITY (B) of the access group, and the
DATE (C) you defined the access group in the Administrator
Utility.
Table 1-0. (cont.)
Seven columns are provided for the definitions of Access PC
users belonging to the access group:
(D) USER NAME The name you want to give the Access PC user. The name you
enter in Access PC can be up to 16 characters long and must
begin with an alpha character followed by any combination of
alphanumeric characters and/or hyphens. (Access Server
upshifts alpha characters in this field.)
(E) PASSWORD The password (optional) you want to give the user. If you
provide a password, it, too, can be up to 16 characters long
and must begin with an alpha character followed by any
combination of alphanumeric characters and/or hyphens.
(Upper and lower case are significant in the assignment of
passwords.)
(F) MT The maximum number of result tables this user can save on the
host HP 3000. You might put UNLMT in this column if you
don't want to set a limit.
(G) MS The maximum number of disc sectors this user's saved tables
can occupy on the disc drives connected to the host HP 3000.
You can put UNLMT if you don't want to set a limit.
(H) PQ The MPE priority of the user's server process. The default
is CS, the normal priority for interactive processes. DS is
a lower priority and ES is lower still.
(I) DBA Designates an optional secondary DBA. Put an X (or any
printable character) in this column next to any user to be
configured as a secondary DBA. (Only the primary DBA can
configure a secondary DBA.)
(J) REMARKS A column for any additional information about this user.
(Unlike most other columns, these remarks are not part of the
user definition and are not recorded in the data dictionary.)
The PC user's full name might go here, for example. Or,
since there need not be a one-to-one correspondence between
user names and real people, you might indicate which people
are using which user name.
Eight columns are provided for the definitions of configured
tables accessible to users in this access group:
(K) TABLE NAME The name you assign to each configured table being described.
Table names can be up to 16 characters long and must begin
with an alpha character followed by any combination of
alphanumeric characters and any of these characters: + - * /
? ' # % & @. (In naming tables, keep in mind any
limitations on table names in the applications your PC users
plan to use with data saved from Access Server.)
(L) TT The table type. IM represents an IMAGE table (a table
derived exclusively from one IMAGE dataset). F represents a
table derived exclusively from one file. V represents a view
table (a table derived from one or more previously configured
tables).
Table 1-0. (cont.)
(M) PT Indicates whether the table is a public table. Because no
access groups are assigned to it, a public table can be
accessed by any Information Access user. A No in this column
means you'll need to configure table security for this table.
(Note: A table can be a public table and still have item
security on selected items. Keep track of item security in
the Description column.)
(N) ITEM LIST The names of the items contained in the table. A configured
table can have up to 64 items (columns). For IMAGE tables,
the Add IMAGE Table screens provide an easy way to include
all items from a dataset, so you may not need to list all the
items here in that case; the same is true for file tables.
(O) OP For view tables, the kind of operation required to configure
the table. J3, for example, might mean three tables are
JOINed to create the view table. For a view table derived
from one IMAGE table, you might use an N to mean no special
operation is required.
(P) DATABASE OR FILE The name of the IMAGE database or file the item on the same
line is associated with.
(Q) DATASET The name of the IMAGE dataset the item is derived from. The
name of the file is in the previous column.
(R) DESCRIPTION A place to describe anything noteworthy about the item, or to
refer to a more detailed definition of the view table in
Worksheet 3.
To Plan for Access Groups and Users:.
1. Use your results from Worksheet 1 to estimate the number of access
groups you want to configure. For each access group, make one
copy of Worksheet 2.
2. On each worksheet, fill in an appropriate name and capability for
the access group.
3. For each user you want in the access group, create a user name and
password. You may want to leave the saved-table capability
columns (MT and MS) blank until you've conferred with your System
Manager. Indicate which users, if any, have been or will be
designated as secondary DBAs.
4. Based on what you learned from Worksheet 1 about these users' data
needs, define the IMAGE, file, and view tables for each access
group. For complex view tables, list the table name, briefly
summarize the rest of the information about the table, and refer
yourself to Worksheet 3 for its complete definition.
Once you've completed Worksheet 2 for each access group, you'll have all
the information required to configure access groups, users, tables
(except view tables), and table and item security. If you plan to define
view tables, use Worksheet 3.
MPE/iX 5.0 Documentation