What Can Be Secured?

The following PPM components can be secured:

Operations that access data in the system, such as running functions, running queries, or importing packages, are also secured. To run such operations, you need appropriate security permissions. By default, such operations access data in the system with the same security permissions as the user who runs them. If you are running an operation and your permissions are not appropriate for the task, you will want to limit or expand the operation's access to data. To do so, you can use the login name and password of a user that has the desired permissions.

Some operations can be set and then run automatically when a system or scheduled event triggers them. Such operations also run with the permissions of the user who sets them, or the permissions of someone who the user specified.

System configuration data is listed in the Admin dialog box. You can secure system configuration data by restricting who can access the Admin dialog box.

Related Topics

Security

How is the System Secured?

Security Setting Rules

Hierarchies and Inheritance

Who Receives Permissions?

Setting Permissions

Viewing User Permissions

Setting Data Security

Locking Data

Default Security Settings

Setting Module Security



Legal Notices | Your Privacy Rights
Copyright © 1998, 2020

Last Published Thursday, December 10, 2020