Update TRIAD Security - NUUPTD
This page allows the user to define the following:
- Class Definitions
- User Security Class Assignments
- Cluster Security Definitions
- Attribute Security Information
- Value Level Security
- HR Global Clusters
- HR Global Values
User Definition Tab
This screen is used to view general user descriptive information as well as log on access capabilities of the individual users.
User ID: A string of characters that uniquely identifies the user.
User Name: The name of the user, in first name first order.
Location: A code that describes the typical location of the user.
Description: A description of the user.
Manager: A code identifying the person responsible for managing this user's capabilities and descriptions.
E-Mail Address: The user's Email address used in PO Subsystem for approvals.
Hours: A code that represents the days and hours when the user is allowed to use the system.
TRIAD Class Assignments Tab
Different classes of security may be set-up on this screen. A security class can be thought of as a group/subset of security definitions that are intended to be assigned to particular users. Once assigned to the user, these classes provide for that user's database access and limitations.
Class ID: The security class name.
TRIAD Definitions Tab
Use this tab to define security access in TRIAD for the user defined on the User Definition tab. A user must be associated with a security class that has "read" access to the primary table on the desired screen to be allowed viewing access to that particular screen. Almost all screens have clusters with identical names. In some cases (for example, where two screens refer to the same cluster) a screen may have a different name than its cluster.
Class Name: The security class name.
Description: A description of the security class if included in the definition.
Cluster Tab
On this tabbed page, define cluster level security to be associated with the security class.
Cluster: The cluster that is to be associated with the attribute clause entered.
Description: A description of the security class if included in the definition.
Read: Ability to view information within the cluster.
Write: Ability to add new information to the cluster.
Update: Ability to modify information in the cluster.
Delete: Ability to remove information found within the table.
Verify: Reserved for future use.
Attribute Tab
Define attribute (or data element) level security on this page. This allows the database administrator to restrict access to a particular attribute associated with a defined security class.
Cluster: The cluster that is to be associated with the attribute clause entered.
Cluster Description: A description of the cluster if included in definition.
Attribute: Enter up to six characters for a unique name of the attribute to be assigned to the cluster.
Description: Enter a description of the attribute. REQ
Read: Ability to read a particular Data Element.
Write: Ability to add new information to a particular Data Element.
Update: Ability to modify information stored within a particular Data Element.
Delete: Ability to remove information found within a particular Data Element.
Verify: Reserved for future use.
Value Tab
It is often necessary to define restrictions at the value level. Value level security is defined on this page. Value level security definition allows multiple entries in a table to be reduced based upon values held within designated data elements.
Cluster Name: The Table that is to be associated with the attribute clause entered.
Description: A description of the security class if included in the definition.
Screen Name: The screen that is to be associated with the attribute clause entered.
Screen Description: A description of the screen.
Read: Attach this security any time the screen/cluster is accessed for reading.
Write: Attach this security any time records are going to be written. Successful writing to the database must pass this security clause (ADD MODE).
Update: Attach this security any time the record is going to be updated. (BROWSE MODE)
Delete: Based on information entered in the Data Element Value Clauses Data Element, what information should the User be allowed to delete.
Verify: Reserved for Future Use.
Value Clause: After entering a Data Element Value Clause, the system converts the information entered into SQL Statements which are understandable by the TRIAD Security System. Before storing the updated/added record, be sure that there is data contained within this Data Element. To view the contents of the Auto Create Text Data Element an "!" may be entered in the first character of the Data Element. Once the "!" has been entered, the User will be brought into the visual editor where the Data Element Value Clause's SQL Statements may be viewed.
HR Global Cluster Tab
Use this screen to duplicate the security set on the TRIAD Definitions, Cluster tab, and apply the security globally to all Human Resources screens that have an "Entity ID" attribute.
Cluster Name: The Table that is to be associated with the attribute clause entered.
Description: A description of the security class if included in the definition.
Read: Ability to read a particular Data Element.
Write: Ability to add new information to a particular Data Element.
Update: Ability to modify information stored within a particular Data Element.
Delete: Ability to remove information found within a particular Data Element.
Verify: Reserved for future use.
HR Global Value
Use this screen to duplicate the security set on the TRIAD Definitions, Value tab, and apply the security globally to all Human Resources screens that have an "Entity ID" attribute.
Read Flag: Ability to read a particular Data Element.
Write Flag: Ability to add new information to a particular Data Element.
Update Flag: Ability to modify information stored within a particular Data Element.
Delete Flag: Ability to remove information found within a particular Data Element.
Verify Flag: Reserved for future use.