Refer to documentation Implementation
Presentation
This entry is made in a scrolling grid. Only the access codes are entered, whose coding is free.
Close
Fields
The following fields are present on this tab :
| This code identifies the created records in a unique manner. |
|   |
Close
The following fields are included on the window opened through this button : Block number 1
Block number 2
Close This button is used to copy the totality of access codes to another folder (only those not existing in the target folder are created; in addition, the other access codes existing in the target folder are of course not selected). Use of access codesThe access codes can be entered in a certain number of functions (either in development, or in the management of database elements in the software). The standard behaviour, managed by the object management, is the following: When a file contains an access code, the object management filters the rights to display and to modify each record, since an access code has been entered in the record, in considering the read and write rights accorded to the user in the corresponding access code. This is used to automatically manage simple access rights on standard records where the access code appears, but also facilitates the addition of specific filtering on all object management. Indeed, the simple fact of adding an access code field in one of the screens for an object, in the table associated with an object, and to declare this field in the Access code field section of the object management is sufficient to put in place in the filtering. The supervisor objects situated in the following table use the filters in read and write by access code. When a code for an object is present in bold, the access codes are also tested at execution, the detail of the rights controlled being given later in this document.
It should be noted that the right to modify an access code associated with setups controls not only gives the right to modify the setup characteristics, but also and especially the right to modify its value (whether in the entry of setups or in the personnel choice when the setup is at user level). Similarly, the right to display in the access code associated with statistical setups controls not only the right to display the setup of the code, but also the right to display corresponding statistics. The execution rights are managed in the objects in bold above, in the following way: The access codes present in the set up transactions are used to prohibit the use of these transaction if the execution right is not given to the user. The access codes present in requests are used to prohibit their use in execution mode if the execution right is not given to the user. The access codes present in system transactions prohibit their execution if the execution right is not given to the user. The access codes present in the inquiry screens are used to prohibit the use of these screens if the execution right is not given to the user. There exists a specific case in the control of access codes. Indeed, it is possible to associate these access codes to fields on screens (the allocation of access codes function is used for this association). The read and write rights associated to a code for the user defines if the field can be displayed and/or modifiable by the user. In addition, the read access rights in access codes present in statistics codes (PS2 object) are required not only to view the setup, but also to view the corresponding statistics. Each software package based on X3 technology uses the access codes to control access to the database or movements in the software. The detail on use of the codes is given in an additional annex. |