Adding Security to Processing Options and Data Selection

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Proc Opt Data Sel.

  2. On the Processing Option and Data Selection Security form, enter the user or role ID in the User / Role field and then click Find.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. In the Display UnSecured Items region, complete the appropriate fields and then click Find:

    • Application

      Enter an application name, such as R0006P. Enter *ALL to display all applications.

    • Version

      You can enter a particular version of the application that you entered in the Application field. If you leave this field blank, all versions associated with the application will appear in the UnSecured node.

    • Product Code

    • UBEs Only

      Select this check box to view only batch applications.

      You must perform this step before you can add new security. This step provides a list of applications from which you can apply processing option or data selection security.

      The search results appear under the UnSecured node. Expand the node to view applications (interactive and batch) and menus with interactive or batch applications. After you expand the node, the applications appear in the detail area.

      For example, to set security on applications within the 00 product code, you enter 00 in the Product Code field and click Find. All of the applications (interactive and batch) attached to product code 00 appear after you expand the UnSecured node.

  4. In the Create with region, select one or more of these options and drag applications from the UnSecured node to the Secured node:

    • Change

    • Prompt for Values

      When you select this option, you automatically activate the Change option.

    • Prompt for Versions

    • Prompt for Data Selection

    • Full Access Data Selection

      When you select this option, you automatically activate the following two options:

    • Modify Data Selection

    • Add Data Selection

      See Data Selection Security Scenarios.

  5. Perform one of these actions:

    • Drag applications from the UnSecured node to the Secured node.

    • From the Row menu, select All Objects to move all applications to the Secured node.

    • From the Row menu, select Secure to All to move all objects under the UnSecured node to the Secured node.

      The applications now appear under the Secured node and have the appropriate security.

  6. To change the security on an item, select the item under the Secured node, select the appropriate security option, and then, from the Row menu, select Revise Security.

    In the grid, the values for the security options change accordingly.