× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



There are add-on products from UPI to enhance the ability to navigate the
security systems information and management. With them, you can call up
this info on a screen or on a report, such as who all has the authority to
take certain actions, and fix security by the actions, rather than on person
by person basis.

I have written some query/400 which look at the files storing the user
menus: List the menus people have access to; chart which menus have which
programs, to review where capabilities have been installed. Identify
user-ids still in BPCS security, but gone from 400 security, so before
adding a new person with same user-id as a former person, we have some
baggage to clean up.

If you are investigating a potential breach of responsibility, be aware that
just because a person has access to a program, it does not necessarily mean
they have actually used that program. Also just because someone does not
now have access to some program, does not necessarily mean they have never
had access.

Al Macintyre

-----Original Message-----
From: bpcs-l-bounces@xxxxxxxxxxxx [mailto:bpcs-l-bounces@xxxxxxxxxxxx] On
Behalf Of SRohatgi@xxxxxxxxxxxxxxxxxx
Sent: Wednesday, May 11, 2011 10:24 AM
To: bpcs-l@xxxxxxxxxxxx
Subject: [BPCS-L] BPCS Access by Program

Hi There,

Has any one written a script which can identify list of all programs a
user has access to? I would like to this for all active users.
We are on v 8.1


Thanks in advance for your help.


Sumit Rohatgi
Enterprise Applications Team Lead - Supply

Mother Parkers Tea & Coffee
p: 905-279-9100 ext. 2232
f: 905-279-9821

e: SRohatgi@xxxxxxxxxxxxxxxxxx


Please consider the environment before printing this email


This e-mail message is intended for the use of the addressee and may contain

privileged, confidential or personal information. If you are not the
intended
recipient, please be advised that you are strictly prohibited from using,
disclosing, distributing or reproducing this email or the information
contained
within. If you have received this email in error, please notify the sender
immediately by return e-mail and destroy the original message and any
copies.


Ce message électronique est destiné uniquement à la personne à laquelle il a

été adressé et pourrait contenir des renseignements à caractère confidentiel
et
personnel. Si vous n?êtes pas le destinataire, veuillez prendre note qu?il
vous
est strictement défendu d?utiliser, de divulguer, de diffuser ou de
reproduire
ce courriel ou les renseignements qu?il contient. Si vous avez reçu ce
message
par erreur, veuillez le signaler à l?expéditeur immédiatement en répondant
au
courriel et détruire le message original et toute copie.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.