User Last Login Date/Time Utility With the Role Base Security feature enabled you can programmatically determine a user's last login date and time with the GETATT...
Copy Security This utility allows you to copy the Security Hierarchy and Access Control Lists from one entity to another. Overview: This utility allows you to co...
Create Access Control List This utility will create the initial Access Control List for the selected application(s) and database(s). Overview: The Create Access ...
Security Export Exports the Security Hierarchy and Access Control Lists for transfer to another system. Overview: This utility will transfer the complete Securit...
Security Import Imports a previously exported Security Hierarchy and Access Control Lists. Overview: This utility will import the previously exported Security Hi...
Inactivity Report Prints a list of users sorted by the number of days since last login. Overview: Prints a list of users sorted by the number of days since last ...
Locked Users Prints a list of users who are locked out due to inactivity. Overview: This report will prints a list of users who are locked out due to inactivity....
Security Hierarchy Maintenance This process allows you to maintain the Security Hierarchy. Overview: This process allows you to maintain the Security Hierarchy. ...
New/Changed Objects Prints a detailed list of any changes or additions to the selected Applications. Overview: This report will print a detailed list of any chan...
Security Hierarchy List/Export Prints and exports the Security Hierarchy. Overview: This report will list the currently defined Databases, Departments, Workgroup...
Setting RBS Configuration This process allows you to activate/disable RBS, and set defaults. Overview: The Parameter file for RBS controls various aspects of how...
Access Control List Files/Fields This process allows you to assign security to the files and fields in your applications. Overview: This process allows you to ...
Access Control List Processes This process allows you to assign security to the processes in your applications. Overview: This process allows you to assign sec...
Create Access Control List The next step in setting up RBS is to create the initial Access Control List. Overview: The Create Access Control List utility will po...
Defining Your Databases, Departments, Workgroups, Roles Users The first step in setting up RBS is to define your company's structure. Overview: The first step ...
Setting RBS Configuration The final step in setting up RBS is to set the configuration parameters. Overview: The Parameter file for RBS controls various aspects ...
User Security Overrides Prints any user level security overrides. Overview: This report will print any user level security overrides you have defined. You will b...
User Rights Prints a detailed list of the access rights for Processes, Files and Fields, by user. Overview: This report will print a detailed list of the access ...
Users Lists the users and their membership in the Hierarchy. Overview: This report will list the users and show their membership in the hierarchy, ie, what Datab...