Return to Navigation

Completing Equation Engine Setup

You must set up Equation Engine before using it. This section discusses how to:

Page Name

Definition Name

Navigation

Usage

Run An Equation

SCC_EQTN_RUN_CNTL

select Set Up SACR, then select Common Definitions, then select Equation Engine, then select Run Equation, then select Run An Equation

Compile all equations prior to using Equation Engine.

User Profile Types

PSOPRALIASTYPE

select PeopleTools, then select Security, then select Security Objects, then select User Profile Types, then select User Profile Types

Verify equation security objects.

Tree Definitions and Properties

PSTREEDEFN

select Tree Manager, then select Tree Manager

Click the Tree Definition link on the Tree Manager page.

Adjusting equation security.

Tree Manager

PSTREEMGR

Tree Manager, Tree Manager

Create a tree hierarchy.

User Profiles

PSOPRALIAS

select PeopleTools, then select Security, then select User Profiles, then select User Profiles

Set up security authorizations.

Access the Run An Equation page (select Set Up SACR, then select Common Definitions, then select Equation Engine, then select Run Equation, then select Run an Equation).

Image: Run An Equation page

This example illustrates the fields and controls on the Run An Equation page. You can find definitions for the fields and controls later on this page.

Run An Equation page

Note: Anyone using Equation Engine in your organization must complete the steps in this section to recompile equations.

To recompile equations:

  1. Enter the equation EQCOMPILEALL.

  2. Leave the Global and Type fields blank.

  3. Click the Run button.

  4. Click the OK button on the Process Scheduler Request page.

  5. Verify that the job ran successfully by checking the Process Monitor.

Access the User Profile Types page for EQD (select PeopleTools, then select Security, then select Security Objects, then select User Profile Types, then select User Profile Types).

Note: Financial Aid and Student Financials administrators must complete the steps in this section to verify equation security objects.

Image: User Profile Types page (EQD)

This example illustrates the fields and controls on the User Profile Types page (EQD). You can find definitions for the fields and controls later on this page.

User Profile Types page (EQD)

Verify that the information that appears matches the information provided in the preceding page.

Search the following ID types:

  • EQN

  • EQS

  • EQX

Access the User Profile Types page for EQN (select PeopleTools, then select Security, then select Security Objects, then select User Profile Types, then select User Profile Types).

Image: User Profile Types page (EQN)

This example illustrates the fields and controls on the User Profile Types page (EQN). You can find definitions for the fields and controls later on this page.

User Profile Types page (EQN)

Verify that the information that appears matches the information provided in the preceding page.

Access the User Profile Types page for EQS (select PeopleTools, then select Security, then select Security Objects, then select User Profile Types, then select User Profile Types).

Image: User Profile Types page (EQS)

This example illustrates the fields and controls on the User Profile Types page (EQS). You can find definitions for the fields and controls later on this page.

User Profile Types page (EQS)

Verify that the information that appears matches the information provided in the preceding page.

Access the User Profile Types page for EQX (select PeopleTools, then select Security, then select Security Objects, then select User Profile Types, then select User Profile Types).

Image: User Profile Types page (EQX)

This example illustrates the fields and controls on the User Profile Types page (EQX). You can find definitions for the fields and controls later on this page.

User Profile Types page (EQX)

Verify that the information that appears matches the information provided in the preceding page.

Note: Do not use the EQA ID type at this time.

Access the Tree Definitions and Properties page for EQTN_IDAUTH_TREE (select Tree Manager, then select Tree Manager and click theTree Definition link on the Tree Manager page).

Note: Financial Aid and Student Financials administrators must complete the steps in this section to adjust equation security.

Image: Tree Definitions and Properties page (EQTN_IDAUTH_TREE)

This example illustrates the fields and controls on the Tree Definitions and Properties page (EQTN_IDAUTH_TREE). You can find definitions for the fields and controls later on this page.

Tree Definitions and Properties page (EQTN_IDAUTH_TREE)

Verify that the information that appears matches the information provided in the preceding page.

Search for the following tree names:

  • EQTN_SQAUTH_TREE

  • EQTN_TBAUTH_TREE

  • EQTN_XAUTH_TREE

If you need to create any of these trees, also use the following page elements :

Field or Control

Definition

SetID

(blank)

Set control value

(blank)

Tree branch

(blank)

Valid tree

Valid tree.

Tree root node

PUBLIC

Access the Tree Definitions and Properties page for EQTN_SQAUTH_TREE (select Tree Manager, then select Tree Manager and click the Tree Definition link on the Tree Manager page).

Image: Tree Definitions and Properties page (EQTN_SQAUTH_TREE)

This example illustrates the fields and controls on the Tree Definitions and Properties page (EQTN_SQAUTH_TREE). You can find definitions for the fields and controls later on this page.

Tree Definitions and Properties page (EQTN_SQAUTH_TREE)

Verify that the information that appears matches the information provided in the preceding page.

Access the Tree Definitions and Properties page for EQTN_TBAUTH_TREE (select Tree Manager, then select Tree Manager and click the Tree Definition link on the Tree Manager page).

Image: Tree Definitions and Properties page (EQTN_TBAUTH_TREE)

This example illustrates the fields and controls on the Tree Definitions and Properties page (EQTN_TBAUTH_TREE). You can find definitions for the fields and controls later on this page.

Tree Definitions and Properties page (EQTN_TBAUTH_TREE)

Verify that the information that appears matches the information provided in the preceding page.

Access the Tree Definitions and Properties page for EQTN_XTAUTH_TREE (select Tree Manager, then select Tree Manager and click the Tree Definition link on the Tree Manager page).

Image: Tree Definitions and Properties page (EQTN_XTAUTH_TREE)

This example illustrates the fields and controls on the Tree Definitions and Properties page (EQTN_XTAUTH_TREE). You can find definitions for the fields and controls later on this page.

Tree Definitions and Properties page (EQTN_XTAUTH_TREE)

Verify that the information that appears matches the information provided in the preceding page.

Access the Tree Manager page (select Tree Manager, then select Tree Manager).

Image: Tree Manager page

This example illustrates the fields and controls on the Tree Manager page. You can find definitions for the fields and controls later on this page.

Tree Manager page

Create a tree hierarchy from the PUBLIC node if one does not already exist for each of the trees. The tree hierarchy should contain a separate node for Financial Aid administrators and a separate node for Student Financials administrators. You can break this down further if you want to limit who can run equations versus who can edit an equation within the groups.

Tree Name

Description

EQTN_IDAUTH_TREE

Authorizations for editing, viewing, or running equations.

EQTN_SQAUTH_TREE

Authorizations for editing or running equation SQL.

EQTN_TBAUTH_TREE

Authorizations for reading tables and view from an equation.

EQTN_XTAUTH_TREE

Authorizations for running external COBOL routines from an equation.

Note: Do not use EQTN_AEAUTH_TREE at this time.

Access the Edit Data page (click the Edit Data icon on the Tree Manager page).

Image: Edit Data page

This example illustrates the fields and controls on the Edit Data page. You can find definitions for the fields and controls later on this page.

Edit Data page

Under each node, add or edit the list of objects and indicate what level of security should be applied to the node.

To do this, click the Edit Data icon (pencil icon) and then insert rows of equation object names and grant appropriate authorization levels.

Field or Control

Definition

Execute

Select the Execute value if the user has the security clearance only to run equations.

Read

Select the Read value if the user has the security clearance to read and run equations.

Write

Select the Write value if the user has the security to write, read, and run equations.

All tables and views should have only Read access at this time. Equations should have a mix of authorizations depending on the position of the person accessing them. External routines and SQL should have only Execute access.

Note: You should create the node hierarchy and save the tree structure before adding equation object names so that authority propagation can take place.

Objects newly placed within the PUBLIC node should have their access propagated to Append Auth to All Child Nodes.

Save any changes you made to the trees.

Access the User Profiles page (select PeopleTools, then select Security, then select User Profiles, then select User Profiles).

Image: User Profiles page: ID tab

This example illustrates the fields and controls on the User Profiles page: ID tab. You can find definitions for the fields and controls later on this page.

User Profiles page: ID tab

For each person in a department who needs security authorization other than PUBLIC, you must follow these steps:

  1. Enter the person's ID number and access the ID tab.

  2. Enter each of the four EQ ID types in the ID Type and Values fields.

  3. Enter the appropriate Equation Security Tree node name for each of these ID types.

  4. Save the user profile.

See PeopleTools: Security Administration