This page (revision-10) was last changed on 26-Nov-2021 10:22 by JMyers

This page was created on 26-Nov-2021 10:22 by Administrator

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note
10 26-Nov-2021 10:22 3 KB JMyers to previous
9 26-Nov-2021 10:22 3 KB JEscott to previous | to last
8 26-Nov-2021 10:22 2 KB JEscott to previous | to last
7 26-Nov-2021 10:22 2 KB JMyers to previous | to last
6 26-Nov-2021 10:22 2 KB JMyers to previous | to last
5 26-Nov-2021 10:22 2 KB JMyers to previous | to last
4 26-Nov-2021 10:22 1 KB JMyers to previous | to last
3 26-Nov-2021 10:22 1 KB Administrator to previous | to last
2 26-Nov-2021 10:22 1 KB Administrator to previous | to last
1 26-Nov-2021 10:22 157 bytes Administrator to last

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 5 changed one line
Go into IMER and determine the functions for the new role(s) and what those roles can do within the function (i.e. Create, Update, Retrieve, Delete).
IMER determines the functions for the new role(s) and what those roles can do within the function (i.e. Create, Update, Retrieve, Delete). You can define the user or role (but not both) to have execution to the function. We supply by default the P2K_Master role. When you start up you may have this role assign to a few core users, but when you go live you will have P2K_Master assigned to P2K_User.
At line 7 removed 2 lines
You can define the user or role (but not both) to have execution to the function. We supply by default the P2K_Master role. When you start up you may have this role assign to a few core users, but when you go live you will have P2K_Master assigned to P2K_User.
At line 19 added one line
The definition data for the Assign Security Rights screen is stored in the [P2K_AM_SECURITY_VALUES] table.
At line 22 changed one line
User Or Role
;[User|]:
;[User|]: Or ;[Role|]: