Copy Security This utility allows you to copy the Security Hierarchy and Access Control Lists from one entity to another. Overview: This utility allows you to copy...
Create Access Control List This utility will create the initial Access Control List for the selected application(s) and database(s). Overview: The Create Access...
Security Export Exports the Security Hierarchy and Access Control Lists for transfer to another system. Overview: This utility will transfer the complete Security...
Security Import Imports a previously exported Security Hierarchy and Access Control Lists. Overview: This utility will import the previously exported Security Hierarchy...
Inactivity Report Prints a list of users sorted by the number of days since last login. Overview: Prints a list of users sorted by the number of days since last...
Locked Users Prints a list of users who are locked out due to inactivity. Overview: This report will prints a list of users who are locked out due to inactivity...
Security Hierarchy Maintenance This process allows you to maintain the Security Hierarchy. Overview: This process allows you to maintain the Security Hierarchy...
New/Changed Objects Prints a detailed list of any changes or additions to the selected Applications. Overview: This report will print a detailed list of any changes...
Security Hierarchy List/Export Prints and exports the Security Hierarchy. Overview: This report will list the currently defined Databases, Departments, Workgroups...
Setting RBS Configuration This process allows you to activate/disable RBS, and set defaults. Overview: The Parameter file for RBS controls various aspects of how...
Access Control List Files/Fields This process allows you to assign security to the files and fields in your applications. Overview: This process allows you to...
Access Control List Processes This process allows you to assign security to the processes in your applications. Overview: This process allows you to assign security...
Create Access Control List The next step in setting up RBS is to create the initial Access Control List. Overview: The Create Access Control List utility will populate...
Defining Your Databases, Departments, Workgroups, Roles Users The first step in setting up RBS is to define your company`s structure. Overview: The first step...
Setting RBS Configuration The final step in setting up RBS is to set the configuration parameters. Overview: The Parameter file for RBS controls various aspects...
User Security Overrides Prints any user level security overrides. Overview: This report will print any user level security overrides you have defined. You will...
User Rights Prints a detailed list of the access rights for Processes, Files and Fields, by user. Overview: This report will print a detailed list of the access...
Users Lists the users and their membership in the Hierarchy. Overview: This report will list the users and show their membership in the hierarchy, ie, what Database...
RUN in Series or Parallel When you RUN from APPX/Unix, APPX won`t resume running until the shell object called has completed. They execute in series. When you RUN...
Reading SQL/Server Tables from APPX/Unix In order to access data stored under SQL Server under Windows while running APPX/Unix you have 2 choices, depending on which...
Patch Releases 5.0.1 and 5.0.2 addressed a small number of bugs that were discovered in Release 5.0.0, as follows: Release Notes for 5.0.1 APPX/Net, which was...
Removing Inactive Sessions `I connect to my customer over the Internet, running APPX on their Windows server. It works okay, but once in a while my APPX session just...
Running Windows Functions from APPX Invoking Windows Shell Functions In order to invoke a Windows shell function (such as a batch file or executable) from APPX...
Runtime (,RT ) Calls WARNING: These are UNSUPPORTED features used to call operating system functions, and they may be changed or removed at any time. Although these...