VISTA Plus for MPE Administrator's Guide
Chapter 5
5-8
Assigning Report Security
Security for reports will be checked when security masks have been defined for a report. When a
security mask has not been assigned to a report, all users will be allowed to view the report. When
security masks have been assigned to a report, only users that match the security masks are allowed
to view, delete, or print the report.
You can assign a security mask to a report by positioning the cursor in the User.Account field and
entering a mask. Enter Y in the Read, Delete and Print fields, if the users are allowed to read,
delete, or print the report. After you have entered the security masks, enter A in the Function field
to add the report record. Press Enter to save the additions.
Security checking is performed when a report is selected in the Select Report window. Security
checking searches the report records to determine if a security mask has been defined for the report.
If a mask has been defined, a check is made against the security masks to verify the user logon
name matches one of the security masks. If a match is detected, the Read flag associated with the
security mask is checked to determine if the user can read the report.
Note. A maximum of 15 security masks can be assigned to a report.
In the example below, all users logged into the PLANB account with a user name of MGR can
view the report. The users are not able to delete or print the report. In the next line, all users logged
into the QUEST account with a session name of ASSEMBLY and a user name of USER can view,
delete and print the report. In third line, all users logged into the NETBASE account can read the
report but not print or delete the report. In the last line, all users logged into the SYS account with
a user name starting with the letters MGR can read, delete and print the report.
******************* Report Security ********************
Session,User.Account Read Delete Print
[@,mgr.planb ] [Y] [N] [N]
[assembly,user.quest ] [Y] [N] [N]
[@,@.NETBASE ] [Y] [N] [N]
[@,mgr@.SYS ] [Y] [N] [N]
Note. You must have AM or SM capability to run this program. Only SM users can
modify, delete, and report records defined for accounts the user is not logged in to.