Access Control
The Access Control (SCRACS) page provides the mapping of resource groups to security roles, and to define the allowed actions. Apart from defining authorized actions, it also allows the setup organizational and field security for a role/resource group combination. If field security has been set up, the Data Field Security Indicator check box must be checked in order for the system to verify the field security rules.
Field InformationField Information
Field |
Description |
Resource Group |
Indicates the Resource Group that needs associated with the selected Security Role. |
Security Role ID |
Indicates the Security Role to be associated with the selected Resource Group. Enter ANY in this field if all users should have access to all resources that belong to the selected Resource Group. |
Organizational Security |
The type of organization security associated with access to a resource with organizational chart of account codes. Valid values are:
|
Data Field Security |
If field security has been set up, this check box must be checked in order for the system to verify the field security rules. If field security and this is un-checked, field security is ignored for this Security Role and Resource Group combination |
UI Field Security |
An indication that will activate UI Field Security for the given combination of resource group and security role. |
Use Role’s Override Level |
An indication to use the assigned override level for the user role instead of the override level assigned to the user. There is one exception: for users in the ADMN role, the override level from the User Information record is always used. To arrive at the Access Control record that grants the user the privilege to override, a User’s security roles, sorted by Precedence, along with Resource Group ID are used for lookup. |
Approval Level 1 to 15 |
A series of check boxes to choose the approval levels for the selected combination of resource group and security role. Grant All and Remove All buttons serve as data entry tools. |
Actions |
An extensive group of check boxes are the actions that can be performed by the selected combination of resource group and security role. It is important to note that the Actions section contains actions that are allowed only for certain resource types, for example, “Page Open” is an action that is only applicable for a page/tab/widget resource. Grant All and Remove All buttons serve as data entry tools. Note, there is no harm when an action that does not apply to an application resource within a resource group. In a table that follows the related pages, are illustrations that indicate which actions are valid for the different application resource types. Note that very rarely would all of these actions be enabled for a resource type. These illustrations only indicate possible settings. Special Notes:
Data entry is facilitated by Grant All and Remove All buttons. |
Application Actions |
These check boxes are an extensive list of the custom actions that should be granted for the resource group and security role combination. These actions are defined on the Transaction Custom Action Definition page and appear as check boxes on Access Control. When in doubt what an action represents, please see that definition page. Application Actions appear on specific transactions and pages as buttons and actions available from various menu points. Most application actions only appear on a specific transaction or page. This means that these actions are not generic. In order to understand what Application Actions to enable or disable, the administrator must know what transaction or page is assigned to the resource Group. In order to prevent a scenario where Application Actions are disabled by mistake, it is recommended that all be enabled by using the Grant All button. This makes configuration easier to maintain because the administrator would only need to disable an action (that is, clear the check box) when such scenarios have been identified. |
Security Roles - A transition to the Security Role page for the selected security role.
Resource Groups - A transition to the Resource Groups page, which allows the definition and review resource groups in the system.
Foreign Organizations - A transition to the Foreign Organization page showing all records with the selected resource group and security role.
Assign User to Security Role - A transition to the Assign User to Security Role page for the selected security role.
Below is a table that relates each action to the system resource(s) that it can apply.
Action |
Type |
|||
|
Transaction |
Page /Tab /Widget |
Reference Table / Inquiry |
Batch Job |
Schedule |
Yes |
|
|
Yes |
Deactivate |
Yes |
|
|
|
Activate |
Yes |
|
|
|
Archive |
Yes |
|
|
|
Archive History |
Yes |
|
|
|
Unarchive |
Yes |
|
|
|
Unarchive Preview |
Yes |
|
|
|
Open |
Yes |
|
|
|
Save |
Yes |
Yes |
Yes |
|
Edit |
Yes |
|
|
Yes |
Insert Line |
|
Yes |
Yes |
|
Delete Line |
|
Yes |
Yes |
|
Attach |
Yes |
Yes |
Yes |
|
New |
Yes |
|
|
|
Copy |
Yes |
|
|
|
Discard |
Yes |
|
|
Yes |
Validate |
Yes |
|
|
|
Submit |
Yes |
|
|
Yes |
Import |
Yes |
|
|
|
Export |
Yes |
|
|
|
Yes |
|
|
|
|
Scan |
|
|
Yes |
|
Approve |
Yes |
|
|
Yes |
Reject |
Yes |
|
|
|
Unapprove |
Yes |
|
|
|
Reassign |
Yes |
|
|
|
Send Message |
Yes |
|
|
|
Reject All |
Yes |
|
|
|
Recall |
Yes |
|
|
|
Bypass Approvals |
Yes |
|
|
|
Mark for Processing |
Yes |
|
|
|
Hold Transaction |
Yes |
|
|
|
Apply Overrides |
Yes |
|
|
|
Remove Overrides |
Yes |
|
|
|
Page Open |
|
Yes |
|
|
Indirect Authority |
|
|
Yes |
|
Delete Att. View Att |
|
|
Yes |
|
Add Comments |
Yes |
|
|
|
Download Transaction |
Yes |
|
|
|
Kill Job |
|
|
|
Yes |
Restart Job |
|
|
|
Yes |
View Completed Jobs |
|
|
|
Yes |
View Pending Jobs |
|
|
|
Yes |
View Others' Jobs |
|
|
|
Yes |
View Job Log |
|
|
|
Yes |
View Job Report |
|
|
|
Yes |
Verify Job Running |
|
|
|
Yes |
Change Worklist Priority |
|
|
Yes |
|
Bypass Prior Approvals |
|
|
Yes |
|
Collaborate |
Yes |
|
|
|
Recall from Workflow |
Yes |
|
|
|
Administer Alerts |
|
|
Yes |
|