HP SENTRY Manuale Utente Pagina 68

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 113
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 67
Section 2 - 38 SENTRY Users Guide
Fitzgerald & Long
2.6 USER ITEM PROTECTION MAINTENANCE
This is a special SENTRY feature which allows you to define SENTRY security objects. These objects
may be accessed through subroutine calls to solve unique security problems which may not be met through
permissions and VOC item security facilities. For example, you may have a personnel inquiry screen in
which you would like to limit the display of the salary field to only a certain group. Through defining a
user item which specifies the rights for users and/or groups, you may then add a call to the
SENTRY.USER.ITEM.CONTROL subroutine to check the rights of the user before displaying the salary
field. By using this technique, individual fields may be protected in data entry/inquiry programs as well as
in the database reporting language. You may also call our violations logging subroutine to log program or
report use.
USER.ITEM.MAINT User Item Protection Maintenance 08/07/00
Account Name : /usr/sentry
User Item Name : PAYROLL
1. Description : Protect the Payroll file from LIST
2. Other Rights: NONE
===================================================================
3. Users 4. Rights
01) 201 bee ALL
===================================================================
5. Groups 6. Rights
01) 9 piadm ALL
Enter field number, "F"ile, "DEL"ete or "<ESC>" to exit :
Figure 33 - This is an example of the “User Item Protection Maintenancescreen. Selection 6 on the
“Database Maintenance Menuinvokes this program.
Use of this feature of SENTRY requires some programming effort. Because of the flexibility of the
SENTRY routines, this effort is generally very nominal. For an experienced Basic programmer, SENTRY
offers a very sophisticated level of security for very little effort. Please refer to the appendices for
documentation of the user callable SENTRY subroutines, the arguments, and examples on how to
implement their use.
Vedere la pagina 67
1 2 ... 63 64 65 66 67 68 69 70 71 72 73 ... 112 113

Commenti su questo manuale

Nessun commento