Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Role Based Security (RBS) | ||||||||
Line: 62 to 62 | ||||||||
Added: | ||||||||
> > | ||||||||
Comments:Read what other users have said about this page or add your own comments. |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Role Based Security (RBS) |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Role Based Security (RBS) | ||||||||
Line: 44 to 44 | ||||||||
Managing Security | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
Reports | ||||||||
Line: 54 to 54 | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
Utilities |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Role Based Security (RBS) |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Role Based Security (RBS) | ||||||||
Line: 52 to 52 | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
Utilities |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Role Based Security (RBS) | ||||||||
Line: 36 to 36 | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
ReferenceManaging Security | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
Reports | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
|
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Role Based Security (RBS) | ||||||||
Line: 27 to 27 | ||||||||
Both of those settings can be set at the Database, Department, Workgroup, Role and User level. Lower levels take priority over higher levels, so a setting at the User level overrides all other levels. | ||||||||
Changed: | ||||||||
< < | RBS allows you to control execution of processes by the parent/child process combination. In other words, a user might be able to run 'Customer File Maintenance' from the 'File Maintenance' menu, but not from the Order Entry screen. | |||||||
> > | RBS allows you to control execution of processes by the parent/child process combination. In other words, a user might be able to run 'Customer File Maintenance' from the 'File Maintenance' menu, but not from the Order Entry screen. This is managed by 'Access Control Lists' which will define which users are allowed to access various application objects at run-time and with which permissions. | |||||||
A Parameter file sets default actions and other features of RBS. | ||||||||
Added: | ||||||||
> > | RBS is accessed from the 'System Administration' menu. | |||||||
Getting Started | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
| ||||||||
Added: | ||||||||
> > | ||||||||
ReferenceManaging Security | ||||||||
Line: 47 to 49 | ||||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
| ||||||||
Line: 53 to 55 | ||||||||
| ||||||||
Deleted: | ||||||||
< < | ||||||||
Utilities | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > | ||||||||
Comments:Read what other users have said about this page or add your own comments. |
Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
Added: | ||||||||
> > |
Role Based Security (RBS)This release of Appx includes a new method of managing security, known as 'Role Based Security'.Overview:The new Role Based Security (RBS) will provide an alternative to the existing APPX Security Profiles feature. The resulting run-time security provided by RBS will be similar in function to the run-time security capabilities provided by the existing APPX Security Profiles feature but will be much easier to manage. It is referred to as 'Role Based Security' because the security can be managed by a job function, rather than by individual users. There is a 5 level hierarchy that allows you to define the job functions in your company:
Getting Started
ReferenceManaging Security
Comments:Read what other users have said about this page or add your own comments.-- JeanNeron - 2012-10-30 |