Tags:
create new tag
view all tags
Searched: ^r

Results from Main web retrieved at 15:51 (GMT)

Copy Security This utility allows you to copy the Security Hierarchy and Access Control Lists from one entity to another. Overview: This utility allows you to copy...
Create Access Control List This utility will create the initial Access Control List for the selected application(s) and database(s). Overview: The Create Access...
Security Export Exports the Security Hierarchy and Access Control Lists for transfer to another system. Overview: This utility will transfer the complete Security...
Security Import Imports a previously exported Security Hierarchy and Access Control Lists. Overview: This utility will import the previously exported Security Hierarchy...
Inactivity Report Prints a list of users sorted by the number of days since last login. Overview: Prints a list of users sorted by the number of days since last...
Locked Users Prints a list of users who are locked out due to inactivity. Overview: This report will prints a list of users who are locked out due to inactivity...
Security Hierarchy Maintenance This process allows you to maintain the Security Hierarchy. Overview: This process allows you to maintain the Security Hierarchy...
New/Changed Objects Prints a detailed list of any changes or additions to the selected Applications. Overview: This report will print a detailed list of any changes...
Security Hierarchy List/Export Prints and exports the Security Hierarchy. Overview: This report will list the currently defined Databases, Departments, Workgroups...
Setting RBS Configuration This process allows you to activate/disable RBS, and set defaults. Overview: The Parameter file for RBS controls various aspects of how...
Access Control List Files/Fields This process allows you to assign security to the files and fields in your applications. Overview: This process allows you to...
Access Control List Processes This process allows you to assign security to the processes in your applications. Overview: This process allows you to assign security...
Create Access Control List The next step in setting up RBS is to create the initial Access Control List. Overview: The Create Access Control List utility will populate...
Defining Your Databases, Departments, Workgroups, Roles Users The first step in setting up RBS is to define your company`s structure. Overview: The first step...
Setting RBS Configuration The final step in setting up RBS is to set the configuration parameters. Overview: The Parameter file for RBS controls various aspects...
User Security Overrides Prints any user level security overrides. Overview: This report will print any user level security overrides you have defined. You will...
User Rights Prints a detailed list of the access rights for Processes, Files and Fields, by user. Overview: This report will print a detailed list of the access...
Users Lists the users and their membership in the Hierarchy. Overview: This report will list the users and show their membership in the hierarchy, ie, what Database...
RUN in Series or Parallel When you RUN from APPX/Unix, APPX won`t resume running until the shell object called has completed. They execute in series. When you RUN...
My Links ATasteOfTWiki view a short introductory presentation on TWiki for beginners WelcomeGuest starting points on TWiki TWikiUsersGuide complete...
Reading SQL/Server Tables from APPX/Unix In order to access data stored under SQL Server under Windows while running APPX/Unix you have 2 choices, depending on which...
Patch Releases 5.0.1 and 5.0.2 addressed a small number of bugs that were discovered in Release 5.0.0, as follows: Release Notes for 5.0.1 APPX/Net, which was...
Removing Inactive Sessions `I connect to my customer over the Internet, running APPX on their Windows server. It works okay, but once in a while my APPX session just...
My Links .ATasteOfTWiki view a short introductory presentation on TWiki for beginners .WelcomeGuest starting points on TWiki .TWikiUsersGuide...
My Links ATasteOfTWiki view a short introductory presentation on TWiki for beginners WelcomeGuest starting points on TWiki TWikiUsersGuide complete...
My Links ATasteOfTWiki view a short introductory presentation on TWiki for beginners WelcomeGuest starting points on TWiki TWikiUsersGuide complete...
Running Windows Functions from APPX Invoking Windows Shell Functions In order to invoke a Windows shell function (such as a batch file or executable) from APPX...
Runtime (,RT ) Calls WARNING: These are UNSUPPORTED features used to call operating system functions, and they may be changed or removed at any time. Although these...
My Links WelcomeGuest starting points on TWiki TWikiUsersGuide complete TWiki documentation, Quick Start to Reference WebHome try out TWiki on...
Number of topics: 29

Topic revision: r83 - 2023-10-30 - BrianRyan
 
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2024 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback