Skip to main content
Skip table of contents

Role Simulator

The Role Simulator plugin in the Administrative Console (Security Admin > Analysis) can assist in the troubleshooting of role-based security.

Select Roles

The Select Roles panel in the left options bar allows one or more roles to be checked. The checked roles make up the combination of security roles that will be used to simulate the security. Since role-based security uses a least-restrictive concept of applying security, the result of adding more roles will increase the amount of access that the simulator will show.

Table Access

The Table Access button on the toolbar activates the part of the plugin focusing on simulating the Database Table access resulting from the role security.

Menu Access

In addition to testing the table restrictions resulting from one or more roles, the user can also test the BusinessPlus menu access resulting from the role security. This view essentially displays the BusinessPlus menu and CDD folder access that would be available to the user with the selected role assignments. The available folders appear as active; unavailable folders appear grayed out.

Process

To begin, enter a table name (e.g., HR_EMPMSTR) in the Table Name field, then select the type of table access to analyze (Read, Write, Update, Delete, Verify).

Selecting the Load button or selecting a security role from the list will result in the security for that table being evaluated. The results appear in four tabs:

  • Where Clause — Displays the Where clause that would be used to enforce security using views in the BusinessPlus software. The Where clause can be used to visually analyze the results of the security.
  • Chart — Displays a chart that shows the security roles used to create the simulation as well as the table or Common Security tables used to create the Where clause.
  • Messages — Displays diagnostic information about what types of decisions lead to the Role Security result.
  • Diagnostic — Provides detailed information about the individual roles that may prove useful by technical staff searching for more specific information about the individual role composition.


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.