1 / 40

Record Security

Record Security. IIPS Fall Conference New Bern, NC October 26, 2004. Record Security. Two types of record security: Record security that is programmed into a module or group of modules for a specific purpose.

ellard
Download Presentation

Record Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Record Security IIPS Fall Conference New Bern, NC October 26, 2004

  2. Record Security • Two types of record security: • Record security that is programmed into a module or group of modules for a specific purpose. • Record security within Envision Run-Time that allows you to determine a unique set of security parameters.

  3. Office CodesValcode OFFICE.CODES

  4. Office CodesDOC Screen

  5. Office CodesRLDE Screen

  6. Office CodesSVM Screen

  7. Privacy CodesValcode PRIVACY.CODES

  8. Privacy CodesPID5 Screen

  9. Privacy CodesSVM screen

  10. Privacy CodesBIO Screen

  11. Purchasing/AP ModulesAPPM Screen

  12. General Ledger ModuleGLAP Screen

  13. General Ledger ModuleOVERRIDE Security Class

  14. General Ledger ModuleOVERRIDE Security Class

  15. Budget Management ModuleBRSP Screen

  16. RegistrationRGCT Screen

  17. Registration RGUS Screen

  18. PersonnelHRPS Screen

  19. PersonnelALL.IN.USE Security Class

  20. PersonnelALL.IN.USE Security Class

  21. Record Security in Run Time • Allows you to secure a file so that a user can access only certain records. • Must be able to determine the subset of records by a code field or value.

  22. Record Security • Determine factors that control access to the file or divide the file into subsets. • Determine the individuals that have access to each subset of the file. • Determine a place to store the information that associates the file subsets, or crosswalk information, to a user. • Identify to Envision where the crosswalk information lives. • Identify to Envision the file to secure.

  23. Record SecurityStoring Crosswalk Data LIST DICT UT.OPERS WITH @ID LIKE ...SPARE... BY TYP BY @ID TYP LOC CONV NAME FORMAT SM ASSOC 20:06:54 Oct 21 2004 1 @ID............ TYP LOC..........CONV NAME........... FORMAT SM ASSOC..... SYS.USER.SPARE3 D 19 10L S SYS.USER.SPARE4 D 20 10L S SYS.USER.SPARE5 D 21 10L S SYS.USER.SPARE6 D 22 10L S SYS.USER.SPARE7 D 23 10L S SYS.USER.SPARE8 D 24 10L S SYS.USER.SPARE9 D 27 15L M 7 records listed

  24. Record SecurityRSUC Screen

  25. Record SecurityUTMR Screen

  26. Record SecuritySND Screen

  27. Record Security NAE Lookup

  28. Record SecurityViolation Message

  29. Record SecurityGeneral Ledger File • UTMR does not allow computed columns • Must use a subroutine to extract data in UTMR • Delivered subroutine S.RS.GLNO • RSGL screen used to define crosswalk data • Crosswalk data stored in RECSEC.GL • Security enabled on UTMR • Does not restrict GLTB, GLBS, GLSA, GLBA or CONS

  30. Record SecurityGeneral Ledger File

  31. Record SecurityGeneral Ledger File

  32. Record SecurityGeneral Ledger File

  33. Field Security • Levels of field security: • Denied • Inquiry Only • Modify Data Only • Privileged Access

  34. Field SecuritySCDF Screen

  35. Field SecuritySOD Screen

  36. Field SecurityDisplay

  37. Field SecurityDisplay

  38. Limiting SSN to 4 digits in lookups

  39. Limiting SSN to 4 digits in lookups

  40. AnswerNet Resources 125.1328 - Record Level Security - Steps to setup 114.1974 - Envision Security - Using Record Security for just one process 55.257 - RSGL: Setting up record security 71.250 - In Use Override and HR Security 10.2084 - GLAP and OVERRIDE security setup 71.672 - Record Level Security Setup Example 147.524 - RSGL: Extending record security to GL reports 1164 - how to secure lookup last 4 digits of SSN

More Related