×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
More details on Paul's response
http://publib.boulder.ibm.com/infocenter/systems/scope/i5os/topic/rzarl/rzarllogical.htm
Basically they can only access the physical through various logical files
or views. And the views or logical files could use selection criteria.
The problem with this is you then end up having multiple logical files out
there with different security. So if you have 100 branches you end up
with 100 LFs against that physical (or more if your keen on different
sorting criteria). Think: Design for growth.
You could secure users out of the file altogether. Then the only way they
can access the data is through programs or stored procedure calls. These
would adopt the necessary authority to get into the data. These could
then determine programmatically what users have access to what records.
I know of one company that has secured users out of all files and the only
access is via programs and stored procedures. From what I hear, it's
quite common. Not the norm, mind you, but not rare as hens teeth.
Rob Berendt
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.