MPI_9001 System Security Roles Report
This
For more information, see The Report Properties Dialog.
Overview
The System Security Roles report is designed to list the various security roles and rules that are set up within Millennium® 3. For more information on roles, see the Security Guide.
There may be a large number of roles defined in any Millennium® 3 system. For that reason, this report includes an additional formula that allows you to enter a single role, a comma-separated list of roles, or all roles.
Date Selection
In the Report Properties dialog, click on the Date Selection tab. The system displays the Date Selection page.
As explained in Date Selection, you can use Override Dates to select specific check date/process number combinations. Millennium® usually bases each report on one or the other: the date or the process number.
This report is based on the settings as of the moment the report is run.
Data Selection
As explained in Data Selection , you can use the Data Selection tab to include company filters to narrow down the selected data for this report. However, this is a system report and you cannot use filters on it.
Subtotals/Breaks
You cannot use the Subtotals/Breaks tab because this report does not use groups or sorts.
Additional Formulas
In the Report Properties dialog, click on the Additional Formulas tab. The system displays the Additional Formulas page:
Figure 2-506: Additional Formulas page
For more information about using additional formulas, see Additional Formulas. The additional formulas for this report are explained below:
Formula | Description |
---|---|
Enter a list of Roles |
Enter the appropriate text to list the roles you desire to include. Valid entries are:
|
Page Break on Role | If you put a check in this check box, the report lists each role on a new page. |
Display UI Interface |
Use this drop-down list to select default user interface setting. The report displays a user interface (UI) tree that displays those areas a user either has access to or is blocked from. The UI tree may not be necessary for all roles. Valid entries are:
|
The remaining additional formulas correspond to pages or sub-pages of security settings in Millennium®. For more information on these settings, see Security.
These formulas are check boxes to indicate whether a “section” of settings that defines rules associated with a role (with the exception of Hide User List) should be hidden or excluded from the report. These sections are not mandatory and may not be used in all roles.
To hide a particular security setting, put a check in the appropriate check box:
- Hide Report Security Settings—Corresponds with the System > Security > Roles > [role] > Report Security tab.
Note: If you put a check in this check box, everything below is also hidden (even though none of the check boxes are automatically checked to reflect that). The only exception is Hide User List.
- Hide Security Rules—Corresponds with the System > Security > Roles > [role] > Rules tab.
- Hide User List—On the report, the “User List” section provides a list of users assigned to a role, which does not correspond with anything in the Millennium® interface.
- Hide Rule Setup—Corresponds with the System > Security > Roles > [role] > Rules > Rule Setup sub-tab.
- Hide Rule Conditions—Corresponds with the System > Security > Roles > [role] > Rules > Conditions sub-tab.
- Hide Record Rights—Corresponds with the System > Security > Roles > [role] > Rules > Record Rights sub-tab.
- Hide Field Rights—Corresponds with the System > Security > Roles > [role] > Rules > Field Rights sub-tab.
- Hide Function Rights—Corresponds with the System > Security > Roles > [role] > Rules > Function Rights sub-tab.