Security roles can be used to set access restrictions by
operator and menu, to control accessibility and visibility of
defined menus, menu options, buttons, and utility features.
For operator role start-up on a new system and for role security
overview information refer to Start-Up Operator
Role Security.
Note: When the external 'Authentication' feature is enabled in the Texada Support Parameters this "Security Roles" processing is disabled and the operator is redirected the to the User Management Menu on Texada Web.
The roles can be maintained in the Security Roles window on the
Security tab of the Configure System
Settings.
An operator must also be assigned a Security Role that allows
permission to the Security - Security Roles in order to
access this table.
The prompts to define Security Roles include:
Example of different Roles within a menu:
The
'Counter' menu can be assigned role COUNTER, but the "Invoice"
entry program within the 'Counter' menu could be assigned the role
MANAGER.
Then when the 'Counter' menu is loaded for an operator with only
the COUNTER role assigned, that operator would not see the
"Invoice" entry option, however an operator with the MANAGER role
would see the complete 'Counter' menu including the "Invoice" entry
program.
Note: Any changes on the spreadsheet only impact operators on
the spreadsheet when it is imported.
If the "Allow" column for an operator on the spreadsheet is not
set to Y or YES, then when the spreadsheet is imported this
operator will be removed from the role.
Refer to Import Security Roles for
information on interpreting and managing the resulting spreadsheet
before importing it.
Note: If any menu options or operators are deleted from the spreadsheet prior to importing, the role accessibility security will NOT be changed for those options and operators that have been removed from the spreadsheet.
When the spreadsheet is completed, it can be saved as a "tab-delimited text file" so that it can be imported back into the software updating the role security.
Copy Permission Setup to a New Similar Role:
If a new role is created that will require permissions similar to
an existing role, the permissions from the existing role can be
copied to the new role, and then be modified as required.
Copy the permissions as follows:
Note: The role and the operators must already exist in the
import company before the permissions can be imported.
Always review the permissions for this target role to ensure the
record is properly created prior to the import.
On exiting, the menu tree view is rebuilt.
The Operator Security Report can be used to export a list of all operators with their security roles and their current SRM access information to a spreadsheet.
ACTIONS:
Additional actions provided by buttons on
the Security Roles screen include:
If a role is deleted it is also removed from any Operator records, and those operators will no longer have access to the software using these permissions.
Assign Security Roles to Operators:
Select a Role by clicking on a a field in the role detail
line and click the ASSIGN button to update security
role access by operator name across divisions as outlined in
Operator Security Roles.
List Menu Options and Role Assignment:
Click the MENU button to access the Menu Role Assignment which lists options in the menu
tree based on the standard menu or the company default, with the
current roles assigned and provides the ability to update
roles.
A spreadsheet listing the menus and roles can be generated.
This button is only enabled if the role assigned to the operator also has access to the Application Menu utility, per the System - Application Menu flag in Security Role Permissions.
Converted from CHM to HTML with chm2web Pro 2.85 (unicode) |