System Commands Access Control groups
System Commands Access Control Groups can be used to deny and hide specific iBase commands to users.
System Commands Access Control groups allow you to:
- Deny use of iBase commands that would otherwise be available to users because of their membership of one or more Database Management groups.
- Hide iBase commands and toolbar buttons that are not available because of a user's membership of one or more Database Management groups. Where it is not possible to hide these, a message is displayed You do not have the necessary permissions to perform this action.
- Record the user's reason for using a particular command.
- Log the use of the command in the audit log.
To display the System Commands Access Control dialog:
- Click From the Security menu in iBase Designer, select System Commands Access Control.
Existing security groups are listed in the left of the dialog. See Creating Groups and Adding Members if there no groups of this type defined in the security file.
Note: You can also deny use of iBase functionality to all the users of the local machine, rather
than just to the members of a specific user group.
Access to basic menu commands in iBase
A user with full database management permissions (such as SYSADMIN) always has access to the
following menu commands in iBase, even when they are denied access to all the system commands listed
in the following section:
- Find, list, and show records
- Use iBase Link charts
- Create reports
- For links, view the valid end types
- Lists sets, add records to sets, and view set membership
- List labeling schemes and set a default labeling scheme
- Search for duplicate and matching records
- Examine their user details and the database properties
- Set session defaults and change the settings in the Options dialog
- Export data to Microsoft Excel using the Excel Interface
- Define folder objects as common folder objects (only of use when there is a Schema Update license)
Recording the reason for an action
You can require the user to enter a reason for using a particular command in iBase, or an iBase command when working in Analyst's Notebook. The reason is recorded in the audit log; however, the records affected by the command are only recorded if you set the audit level of the database to level 5.
To prompt the user to record a reason for an action:
- In the System Commands Access Control dialog, select the group on the left and then turn on the required check box on the Reason for Action page.
Group | Description |
Audit Analysis | Members of the group are
prompted to enter a reason whenever they open a database or perform any analysis on iBase records,
such as:
|
Audit Charting | Members of the group are only prompted to enter a
reason when they work with iBase data on charts, specifically:
|
Audit Data Exposure | Members of the group are prompted to enter a reason when they use any command in iBase that may result in data being printed (for example by exporting or reporting); or use iBase data in Analyst's Notebook, or i2 iBase Geographic Information System Interfaces. |
Data Auditing: create, edit, delete | Members of the group must enter a reason for adding, editing, or deleting records before they can save the record. They are also prompted to do this when merging entities, batch editing and deleting, and assigning icons. |
Auditing the commands used
You can record the commands used by a user in the audit log:
- In the System Commands Access Control dialog, select the group on the left and then turn on the required check box on the Audit page.
What users see
Users do not see the commands that you have denied, so named menus (such as
File) and shortcut menus become shorter, and some submenus might disappear
entirely.
Note: Although some command groups deny commands for listing folder objects, users can
still see which folder objects exist by using the Details window of the Database
Explorer.