Difference: 520RoleBasedSecurity (2 vs. 3)

Revision 32012-10-31 - JeanNeron

Line: 1 to 1
 
META TOPICPARENT name="APPX520Features"

Role Based Security (RBS)

Line: 36 to 36
 
  1. Define your Databases, Departments, Workgroups, Roles, Users
  2. Create Access Control List
Changed:
<
<
  1. Set Process Security
  2. Set File/Field Security
  3. Setting RBS Configuration
>
>
  1. Set Process Security
  2. Set File/Field Security
  3. Setting RBS Configuration
 

Reference

Managing Security

Changed:
<
<
  1. Security Configuration
>
>
  1. Security Configuration
 
  1. Security Hierarchy Maintenance
Changed:
<
<
  1. Access Control List - Processes
  2. Access Control List - Files/Fields
>
>
  1. Access Control List - Processes
  2. Access Control List - Files/Fields
 Reports

  1. Security Hierarchy List/Export
Changed:
<
<
  1. Users
  2. Inactivity Report
>
>
  1. Users
  2. Inactivity Report
 
  1. User Security Overrides
  2. New/Changed Objects
  3. User Rights
 
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2024 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback