Breadcrumbs

Tables/Utilities - Security - Functions

The "List Of Users (for Functional Security)" screen (shown below) appears when you click the (Security - Functions) menu button. Once a person has been set up with a User-ID, you can use this screen to limit their access to the appropriate Functions they should have access to. Click on a User-ID to (Update) their security. The default is no access to any Functions other than the 'My' function screens.

The "Assign Functions by User-ID" screen shows all of the current Functions and whether the User-ID has access to any of them.

The "Assign Functions by User-ID, Access Types" screen further shows the type of access you can define for a User-ID. These include _ (blank- No Access), which is the default, I (Inquiry Only), M (Add/Modify) or E (Add/Modify/Erase).

The "Form/User Cross-Reference" screen appears when you click the (Xref) button on the first screen. It shows each Function and each User-ID with access to it along with their type of access.

The "Clone A User's Functional Security Settings" screen appears when you <right-click> a User-ID on the first screen and click the (Clone) button. You can also use the (FROM User) or (To User) buttons to select different User-IDs.

The "Select A User-ID" screen appears when you use the (FROM User) or (To User) buttons to select different User-IDs on the previous screen.

The "Clone A User's Functional Security Settings" screen re-appears with the User-IDs selected. Click (Clone) here to copy a person's security.

The "clone confirmation message box" confirms you are sure you want to change the 'To User-ID's Functional security to match that of the From User-Id's security.

The "Assign Functions by User-ID" screen now shows the 'To User-ID's Functional security settings.