Column Security
Column Security
Secures users from viewing a particular field or changing a value for a particular field in an
application or application version. This item can be a database or non-database field that is defined
in the data dictionary, such as the work/calculated fields.
For example, if you secure a user from viewing the Salary field on the Employee Master application,
the Salary field does not appear on the form when the user accesses that application.
Note:
You can find the tables, applications, forms, business views, and so on, that use a data item by
launching the Cross Reference application (P980011) after you build the cross-reference tables
(F980011and F980021).
You can set up column security on a table, an application, an application version, or a form. Even if an
application uses a business view that does not contain the data item that you want to secure, you can still
secure it, as long as the item appears on a form in the application.
You can set the View and Add options to Y and the Change option to N. With security defined in this manner,
the field appears on the object and is enabled when the user enters the object in add mode. If the user enters the
object in update mode, the field appears but is disabled.
You can set the View and Change options to Y and the Add option to N. With security defined in this manner,
the field appears on the object and is enabled when the user enters the object in update mode. If the user enters
the object in add mode, the field appears but is disabled.
You can set all three options to Y. With security defined in this manner, the field appears on the object and is
enabled in both add and update mode.
Verify that the object that you want to secure is in the table.
Verify that the object that you want to secure is part of an application that uses a business view over a
table containing the object.
COLUMN SECURITY
Verify that the object that you want to secure uses a business view that includes the column containing
the object.
For example, if you want to apply column security to data item RLS (Release Number) in the F00941 table,
RLS must be an item in that table, and it must also be part of an application using a business view over that
table. Finally, the business view over the F00941 table must include a column containing the data item RLS.
If all of these conditions are met, you can successfully apply column security to the data item. Setting column
security on a table also means that you set security on the data item for any other applications that use the
F00941 table.
Verify that the object that you want to secure is in the application.
Verify that you are securing the correct data item in an application (data item descriptions can be
similar, if not identical).
For example, if you want to apply column security to data item UGRP (UserRole) in the Object Configuration
Manager application (P986110), you first verify that the item is in the application. Because it is in the
application, you can apply security to the data item. However, note that data items UGRP, MUSE, USER, and
USR0 all contain the identical data description of User ID. Verify the item by its alias, not by its data
description.
Verify that the object that you want to secure is in the version of the application.
Verify that you secure the correct data item in an application (data item descriptions can be very
similar, if not identical). Verify the item by its alias, not by its data description.
Verify that the object that you want to secure is in the form.
Verify that you secure the correct data item in the form (data item descriptions can be very similar for
different data items).
1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Column.
2. On the Column Security form, complete the User / Role field, and then click Find to display current
column security for the user or role.
3. To add new security, go to the last row of the detail area and enter information into any of these fields:
Table
Application
Version
If you want to add column security to a particular version, enter a version of the application that you
entered in the Application field.
Form Name
You can enter *ALL in any of these fields; however, after *ALL is entered for a table, application,
or form for a specific data item, you cannot enter *ALL again for that data item.
If the value for View is N, the data item will not appear on any of the objects identified in Step 3,
making Add and Change functions obsolete.
Add
Change
5. To change security, change the row values in the detail area.
6. Click OK to save the security information.
1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Column.
2. On the Column Security form, complete the User / Role field, and then click Find.
Note:
If you accessed the Column Security form from the Work With User/Role Security for a specific
record, the user or role associated with the security record appears in the User/Role field by default.
3. Highlight the security record or records in the detail area and click Delete,and then click OK on
Confirm Delete.
4. Click OK when you finish deleting column security.
If you do not click OK after you delete the security records, the system does not save the deletion.