Tags:
create new tag
view all tags

Backlinks to 520RoleBasedSecurity in Main Web (Search all webs)

Results from Main web retrieved at 22:13 (GMT)

APPX 5.2.0 Feature Index This is the starting point to discover details of the new features found in APPX Release 5.2.0. Follow the links below to learn more....
User Last Login Date/Time Utility With the Role Base Security feature enabled you can programmatically determine a user...
Copy Security This utility allows you to copy the Security Hierarchy and Access Control Lists from one entity to another. Overview: This utility allows you to copy...
Create Access Control List This utility will create the initial Access Control List for the selected application(s) and database(s). Overview: The Create Access...
Security Export Exports the Security Hierarchy and Access Control Lists for transfer to another system. Overview: This utility will transfer the complete Security...
Security Import Imports a previously exported Security Hierarchy and Access Control Lists. Overview: This utility will import the previously exported Security Hierarchy...
Inactivity Report Prints a list of users sorted by the number of days since last login. Overview: Prints a list of users sorted by the number of days since last...
Locked Users Prints a list of users who are locked out due to inactivity. Overview: This report will prints a list of users who are locked out due to inactivity...
Security Hierarchy Maintenance This process allows you to maintain the Security Hierarchy. Overview: This process allows you to maintain the Security Hierarchy...
New/Changed Objects Prints a detailed list of any changes or additions to the selected Applications. Overview: This report will print a detailed list of any changes...
Security Hierarchy List/Export Prints and exports the Security Hierarchy. Overview: This report will list the currently defined Databases, Departments, Workgroups...
Setting RBS Configuration This process allows you to activate/disable RBS, and set defaults. Overview: The Parameter file for RBS controls various aspects of how...
Access Control List Files/Fields This process allows you to assign security to the files and fields in your applications. Overview: This process allows you to...
Access Control List Processes This process allows you to assign security to the processes in your applications. Overview: This process allows you to assign security...
Create Access Control List The next step in setting up RBS is to create the initial Access Control List. Overview: The Create Access Control List utility will populate...
Defining Your Databases, Departments, Workgroups, Roles Users The first step in setting up RBS is to define your company`s structure. Overview: The first step...
Setting RBS Configuration The final step in setting up RBS is to set the configuration parameters. Overview: The Parameter file for RBS controls various aspects...
User Security Overrides Prints any user level security overrides. Overview: This report will print any user level security overrides you have defined. You will...
User Rights Prints a detailed list of the access rights for Processes, Files and Fields, by user. Overview: This report will print a detailed list of the access...
Users Lists the users and their membership in the Hierarchy. Overview: This report will list the users and show their membership in the hierarchy, ie, what Database...
System Administration Environment / Widget File Wizards The environment variable wizard assists you in setting APPX environment variables. The Widget wizard explains...
Number of topics: 21

 
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2024 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback