Natural Secured Menus Maintenance System
Functional Specifications

Computing Services
University of Arkansas

Melinda Mays Bowman
Kathryn Cantrell
W. David Wimberly

Revision 6, January 2001


Table of Contents

Introduction

Online Menus and Functions

Miscellaneous


Figures

  1. Main Menu
  2. List All Available Commands
  3. Menu Hierarchy of Available Commands
  4. CDCD Desk Selection window
  5. CDCD Desk Information window
  6. LOGon to another Natural application
  7. FINish, logoff Natural
  8. Desk Administrator's Menu
  9. Desk maintenance
  10. Desk Assignment maintenance
  11. List Desks for a Budgetary unit
  12. List Users for a Desk
  13. List Applications for a Desk
  14. List Historical Desk Assignments
  15. List Positions for a Budgetary Unit and Date
  16. List User IDs for a User
  17. Initialization and Setup Menu
  18. User maintenance, screen 1
  19. User maintenance, screen 2
  20. Application maintenance, screen 1
  21. Application maintenance, screen 2
  22. Menu maintenance
  23. List Applications of an Analyst
  24. List Value security group for Desk administrator's BU
  25. Application Administrator Menu
  26. Command Security group maintenance
  27. Value Security group maintenance
  28. Application Desk maintenance
  29. Application Default Access maintenance
  30. Application Notice maintenance
  31. Application Lock/unlock and Reason
  32. Command Security group Lock/unlock and Reason
  33. List Users of an Application
  34. List Desks for a Command security group
  35. List Desks for a Value security group
  36. List Desks for an Application
  37. List Applications of an Owner
  38. Command Sequence maintenance

Introduction


Document Information

The Functional Specifications for the Natural Secured Menus Maintenance System (NSM-MS) document the functions and features of this system. The NSM-MS system is used to maintain the Adabas files necessary for applications that are developed using the Natural Secured Menus Architecture (NSM-A).


System and Revision Identification

Draft versions of this document were released April 21, 1988 and June 21, 1988. The first version of this document was released July 5, 1988. Revision 1 was made to reflect changes and corrections as a result of the actual development of the system and was released March 15, 1989. Revision 2 incorporated changes to sections shared by the NSM Architecture documentation and added the screen definitions section, released November 27, 1989. Revision 3 added list functions, documentation for the job management facilities and converted the document to IBM's DCF format. It was released October 30, 1990. Changes to the Menu maintenance function were made in May 1991 to allow function modules to reside on the system library and be named UAOxxxx. Revision 4 was released in November of 1992 to incorporate the conversion of the system to version 2 of the NSM Architecture, maintenance of additional application and user elements, and the addition of a new list function (List Applications of an Analyst - LAA). Additionally, Revision 4 removed text concerning job management facilities since they had become a separate NSM application. Revision 5, released in January of 1994, incorporated changes made to the system when desk-based security was implemented in September, 1993. Revision 6 occurred in January 2001 when the document was converted to HTML and the system was updated to support the change to position based desk assignments.

Purpose of this Document

The Functional Specifications are prepared in order to provide a clear and concise definition of the system. This document is prepared initially to ensure that the system meets the intended needs and requirements of those requesting its development. On an ongoing basis, the specifications serve as the primary reference regarding the functions and use of the system. Errors or omissions should be brought forward as they are identified so that corrections can be made.


Concepts






Application Information


Background

Early in the development of Natural 1.2 applications at the University of Arkansas, we reviewed the Command-Driven, Menu-Augmented architecture (CDMA) document developed by John Wheat at the University of Texas. We first decided to implement this design in the development of the General Ledger Front end for Financial Affairs. CDMA was also used in the development of the Student Inquiry System.

With the installation of Natural 2, we sought to improve and eliminate the shortcomings of the Command-Driven, Menu-Augmented design that we implemented in Natural 1.2. The new and improved design is the Natural Secured Menus Architecture (NSM-A). During the winter of 1988, the Financial Aid Tracking System was developed. This system was the first Natural 2 application at the university and the NSM architecture was incorporated into the FINAID design.

The NSM Architecture is also 'Command-Driven and Menu-Augmented' but includes other features. The NSM Maintenance System provides NSM Architecture applications an alternative method for performing security maintenance functions other than Software AG's Natural Security. The NSM design was developed to distribute security functions to the users and to simplify security maintenance. See the NSM Architecture functional specifications for complete information.


Purpose

The purpose of the Natural Secured Menus Maintenance System is to provide maintenance facilities for the files used to establish users, applications, and the access parameters for applications which use the NSM architecture.


Note: The file VALUE-SECURITY is maintained by the NSM-MS system. However, since security by value maintenance will be different for each application, the maintenance for this file will be defined and developed as needed for each application.

These NSM files comprise the primary data requirements for the NSM Maintenance System. Since this application itself is an NSM Architecture application, the same files maintained by the application are required for its operation.


System Overview

The NSM-MS system is developed in Natural using the Natural Secured Menus Architecture. Since the NSM Architecture is "command driven", anyone using the NSM-MS System is able to move from any function to any other function, within their security constraints, by entering the desired command. The basic screen format is the same for all functions within the system. The message line is where prompts, errors and warnings are displayed. The user can select the position of the message line as either the top or the bottom line of the screen. The title and program information, normally displayed as the second line of the screen, contains the program name, program level, function title, and the current date and time. This line will be temporarily overridden by confirmation messages following the completion of most activities. The next two lines are reserved for the display and entry of key fields, the inputs used to specify what data is to be operated on and what is to be done with it. The bottom two lines of the screen are reserved for displaying available PFkeys and their associated functions.

NSM-MS provides online maintenance to the files required to utilize the NSM architecture. This maintenance is performed by three separate groups of users based upon their normal role and function.

The application owners are established by associating up to five different desks with a specific NSM application. They typically will be positions within the department that have primary responsibility for access to the application's data. Up to five Computing Services personnel are assigned as the application as analysts. Desk Administrators are defined by the access privileges granted within NSM-MS, including value security definitions which designate the specific Budgetary Units for which they are responsible.

Application administrators (owners) will directly control access to the data viewed and maintained by their systems. Therefore, they will be primarily responsible for data security, not Computing Services.


Menu Hierarchy

The commands available within the NSM-MS System can be divided by the functional responsibilities of Computing Services, application administrators, and desk administrators. Computing Services is responsible for maintaining Users, Applications, and Menu-Commands for all applications. The application administrators for a specific application are responsible for maintaining the access of desk to their application, command and value security groups, application notices, application locks, command security group locks, and command sequence lists. Desk administrators define and maintain desks as well as assign positions and users within their budgetary unit to these desks. The menu hierarchy for NSM-MS includes a main menu and three sub menus, one for each of these three types of users.

Graphic of the NSM-MS menu hierarchy

General System Features

The following sections describe features and facilities of the NSM Maintenance System which apply to the entire application or are common to all functions.


Security

The Natural Secured Menus Maintenance System is an NSM Architecture application. The architecture provides three forms of security that have been incorporated into the NSM-MS System.
  1. Command Security

    Command security provides a means of restricting a desk or group of desks from accessing one or more commands within an application. This is accomplished by associating desks with a command security group and specifying which commands may be executed (allowed), which commands may not be executed (disallowed), or which commands will be executed with the designated security level with view only access granted to all non-listed commands (selective). Commands which are not available to a user are not displayed on the menus presented to that desk. Command security is inherent in all NSM Architecture applications.

  2. Security Levels

    The NSM-A also provides security levels which may be used to limit or restrict the functions performed within a command. The security levels allowed within the Natural Secured Menus Maintenance System follow. Security levels are enforced according to the order of the values, from most restrictive to most permissive.

    Level Restrictions Enforced
    2 Inquiry only with field restrictions
    4 Inquiry only without field restrictions
    6 Inquiry and Add only (cannot update existing records)
    7 Update (cannot delete)
    9 Delete

    Inquiry with field restrictions would allow a user to view a screen but selected fields would not be displayed. A restricted field in NSM-MS is USER-SSN.

    Each desk of an application is assigned a security level by the application administrator. That value determines the maximum privilege that will be granted to the desk. Additionally, an administrator may designate a more restrictive security level for specific commands a desk is allowed to execute. The lower, more restrictive Security Level is always used. The NSM Architecture provides each function module (command) with the current security level, and, through common code, the application program interprets and enforces the restrictions associated with that security level.

  3. Security by Value

    The NSM Architecture provides security by value in a fashion similar to that of security levels. Value restrictions, if used by an application, are read from the VALUE-SECURITY file and provided to the application program. The value restrictions to be applied must be defined for each application and are unique to that application. Desks are associated with a group code which identifies a particular set of value restrictions. The restriction or enforcement of that security is performed at the function module (command) level and is the responsibility of each application.

    NSM-MS incorporates this form of value security in the maintenance of desks -- desk management functions may only be performed when the operator has been authorized for the budgetary unit associated with the desk and position or user. The system also restricts the applications that may be operated on to those users who have been identified as owners, or in some cases analysts, of the application. Computing Services maintains data in the APPLICATION, USER, and MENU-COMMAND files. Departmental Desk administrators define and update data for the DESK file, as well as the assignments of desks to positions and users on the DESK-ASSIGNMENT file. The application administrators, or owners, update the information on the APPLICATION-DESK file, establish the Command Security Group and Value Security Group data, lock/unlock the command security groups, and maintain application default access ability and security. Application notices may be entered by either owners or analysts of the application, and both groups may also lock/unlock the application. The restriction of these functions to only owners or analysts of an application is a special form of value security that is built into the NSM-MS.


Online Help

Online help is available at the application level, the screen or function level, and the element level. Access to each of these help facilities is as follows:

In addition to these system-wide help facilities, each specific function may provide additional help. Some functions provide the use of PF4 for DeCode. The de-code function will return descriptions associated with coded values on the screen or retrieve additional associated data. This feature will be described in the command description when it is available, and the PF4 function will be labeled on the bottom of the screen.







Online Menus and Functions

Complete documentation for the menus and online functions of the NSM Maintenance System is provided within this document. Menus are presented and then functions are listed in the sequence of their appearance on those menus.


MM - nsm maintenance system Main Menu

The Main Menu is always the first screen displayed when entering the application. The complete menu appears in the Main Menu Figure, or view an actual image of the NSM Main Menu screen in a separate window. This menu contains the commands to access the three NSM-MS sub menus and the utility functions listed.

Figure: Main Menu


Enter, mark or position cursor to desired command                             
 NSOMENU 1 TEST       nsm maintenance system Main Menu - MM      01/08/01 16:30
 Command:      Action: V  Desk:           Appl:           Cmd Sec Grp:         
 Val Sec Grp:           Parm:                                                  
-------------------------------------------------------------------------------
   CMD  Command description                      Required key fields           
   ---- ---------------------------------------- ------------------------------
 _ LAAC List All Available Commands              Command ID                    
 _ MHAC Menu Hierarchy of Available Commands                                   
 _ DAM  Desk Administrator's Menu                                              
 _ ISM  Initialization and Setup Menu                                          
 _ AAM  Application Administrator's Menu                                       
 _ CDCD Change desk/Display Current Desk info                                  
 _ LOG  LOGon to another natural application                                   
 _ FIN  FINish your session (sign off natural)                                 
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help        Quit                                                          






DAM - Desk Administator's Menu

The Desk Administrator's Menu contains the commands used to perform desk administration: defining desks, making desk assignments, and various list functions to display related information. The complete menu appears in the Desk Administrator's Menu Figure, or view an actual image of the Desk Administrator's Menu screen in a separate window.

Figure: Desk Administrator's Menu


Enter, mark or position cursor to desired command                             
 NSOMENU 1 TEST          Desk Administrator's Menu - DAM         01/09/01 13:19
 Command:      Action: V  Desk:           Appl:           Cmd Sec Grp:         
 Val Sec Grp:           Parm:                                                  
-------------------------------------------------------------------------------
   CMD  Command description                      Required key fields           
   ---- ---------------------------------------- ------------------------------
 _ D    Desk                                     Desk                          
 _ DA   Desk Assignment                          Assignment Type, ID & Time    
 _ LDB  List Desk for a Budgetary Unit           Budgetary Unit & Desk         
 _ LUD  List Users (desk assignments) for a Desk Desk & Time                   
 _ LAD  List Applications for a Desk             Desk & Appl                   
 _ LHDA List Historical Desk Assignments         Assignment TYpe, ID & Time    
 _ LPBD List Positions for a BU and Date         Budgetary Unit, Occ Cd & Date 
 _ LUU  List User IDs for a User                 User                          
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help        Quit                                                                                                                   









ISM - Initialization and Setup Menu

This menu contains the functions used by Computing Services to define a new application or perform maintenance functions for existing applications. The complete menu appears in the Initialization and Setup Menu figure, or view an actual image of the Initialization and Setup Menu screen in a separate window.

Figure: Initialization and Setup Menu


Enter, mark or position cursor to desired command                             
 NSOMENU 1 TEST        Initialization and Setup Menu - ISM       01/12/01 15:45
 Command:      Action: V  Desk:           Appl:           Cmd Sec Grp:         
 Val Sec Grp:           Parm:                                                  
-------------------------------------------------------------------------------
   CMD  Command description                      Required key fields           
   ---- ---------------------------------------- ------------------------------
 _ U    User maintenance                         User                          
 _ A    Application maintenance                  Appl                          
 _ M    Menu maintenance                         Appl, Menu Cmd                
 _ LAA  List Applications of an Analyst          Appl, User                    
 _ LVDB List Value sec grp for a Desk admin's BU Budgetary Unit                
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help        Quit                                                         

U - User maintenance

The User maintenance, screen 1 figure is an example of the first screen of the User maintenance function, or view an actual image of the first User maintenance screen in a separate window.

Figure: User maintenance, screen 1


Press PF8 to view next screen or enter new keys                               
 NSOU    1 TEST               User maintenance - U               01/12/01 16:06
 Command:      Action: V  Desk:           Appl:           Cmd Sec Grp:         
 Val Sec Grp:           Parm:           User: WDW                              
-------------------------------------------------------------------------------
  Action: V  User ID: WDW                                         Screen 1 of 2
                                                                               
                                                                               
     Status: A                                                                 
     SSN:    465-96-2408 Emp ID: 128828 on Employee                            
                           Name: Wimberly, David                               
     Name:   Wimberly, David                                                   
             Last Comma First and Middle                                       
     BU:     COMP Computing Services       (Sync'd up monthly)                 
                                                                               
     Case Translation: L                                                       
                                                                               
                                                                               
                                                                               
                                                                               
     Entered:          Updated: 09/01/00 by: WDW                               
                                             David Wimberly                    
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode                   NextS                          

Purpose and Usage

The User maintenance function is used to add, view, or update information about Natural users. The permitted Action codes are: A, V, or U respectively. Values for User ID and Action are always required.

To add or update a user, enter or replace valid values for the required fields. To view, only the desired User ID is necessary. PF10 is required to confirm Actions A and U.

This is a two screen function. The first screen contains user attributes that are maintained by the system administrator. The second screen contains optional elements that may be maintained by the user through the user profile (available from the LOGON application). The field validations and special processing associated with the second screen are documented separately.

The remaining sections address:

"Field Validations, screen 1"
"Special Processing, screen 1"
"Data Base Changes"

Field Validations, screen 1

The following edits are performed on the input data for screen one. Invalid entries will result in an error and must be corrected before any data base change is allowed.

Action

Validation

A

User ID must not exist on the USER file and must not already exist on the NATURAL-SECURITY file.

V,U

User ID must exist on the USER file.

A,U

Status must be A (Active), I (Inactive), or T (Temporary).

A,U

SSN must uniquely identify a record on the USER file if the ID's status is A (Active).

A,U

User Name must be non-blank and contain only alpha characters, one comma, periods or dashes. User Name is in the format last name, comma (required), first and/or middle names or initials.

A,U

Case Translation, if entered, must be either 'U' (Upper) or 'L' (Lower).

Special Processing, screen 1

Action

Special Processing

A

Case Translation is defaulted to 'U'.

A,U

The User Name is not translated to upper case on input.

A

The User is added to Natural Security.

V

User SSN is a restricted field and will be conditionally displayed based upon the security level in effect (must be greater than 2).

Data Base Changes

Data base changes are only performed if all data is valid and PF10 is entered.

Action

Effect on Data Base

A

A new record is stored on the USER file with the corresponding logical field assignments. Additional assignments include: DATE-OF-ENTRY and DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.

U

The existing record on the USER file is updated with the corresponding logical field assignments. Additional assignments include: DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.


U - User maintenance, Screen 2

The User maintenance, screen 2 figure is an example of the second screen of the User maintenance function, or view an actual image of the second User maintenance screen in a separate window.

Figure: User maintenance, screen 2


Please enter new key fields                                                   
 NSOU    1 TEST               User maintenance - U               01/12/01 17:00
 Command:      Action: V  Desk:           Appl:           Cmd Sec Grp:         
 Val Sec Grp:           Parm:           User: WDW                              
-------------------------------------------------------------------------------
  Action: V  User ID: WDW      Wimberly, David                    Screen 2 of 2
                                                                               
   Email Address: wdw@comp.uark.edu                                            
   CMS ID:        DW85047  @ UAFSYSB      Campus Mail Bldg:    ADSB Room: 220 
   Print Dest:    A-DW85047               Default Application:                 
   PF-Key Format  N     Message Line: T   Terminal Type:       3279            
                                                                               
  Color Assignments for 3279 terminals:                                        
                       Modifiable:    Protected:                               
    Default Intensity:     GR             NE         PFKey Name:     GR        
    Intensified:           TU             YE         PFKey Function: TU        
    Reverse Video:         GR             NE         Message Line:   RE        
    Underline:             TU             YE         Override Flag:  N (Y/N)   
  NSM Field options: Modifiable default:      V      Color: NE                 
                     Modifiable intensified:  V             YE                 
                     Conditionally protected: D             TU                 
                     Previous value:          V             GR                 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit                    PrevS NextR                          

Purpose and Usage

Screen two of the User maintenance function is used to view or maintain user profile parameters. This is an optional screen and contains the same elements also maintained by the user profile function available at LOGON.

The remaining sections address:

"Field Validations, screen 2"
"Special Processing, screen 2"

Field Validations, screen 2

The following edits are performed on the input data for screen two. Invalid entries will result in an error and must be corrected before any data base change is allowed.

Action

Validation

A,U

If CMS id is entered, it must be the complete id, including the node (e.g., UAFSYSB).

A,U

PF-Key format must be either 'N' or 'S'.

A,U

Terminal type must be '3270', '3278', or '3279'.

A,U

Message Line position must be either 'T' or 'B'.

A,U

Color assignments for all field types, message line, and PF-Keys are available only for 3279-type terminals. If entered, the color entered must be one of the Natural color codes: BL, GR, NE, PI, RE, TU, and YE.

A,U

The Override Flag, to override program assigned colors with those defined by the user, must be either 'Y' or 'N'.

A,U

The attribute code for NSM fields must be one of the Natural attribute codes: D, V, I, U, C, or B.

Special Processing, screen 2

Action

Special Processing

A

Default values for the user profile are established as follows: Terminal type is '3270', PF-Key format is 'N', Message line position is 'T', NSM modifiable default fields' attribute is 'V', NSM modifiable intensified fields' attribute is 'I', NSM conditionally protected fields' attribute is 'D', and NSM previous value fields' attribute is 'V'.

A,U

When the user enters color codes and field attributes, the corresponding fields on the screen which are defined with those attributes reflect the user's choices. For example, when a user selects the color code 'BL' for the PF-Key name and presses ENTER, the PF-Key names at the bottom of the screen are displayed in Blue.


A - Application maintenance

The Application maintenance, screen 1 figure is an example of the first screen of the Application maintenance function, or view an actual image of the first Application maintenance screen in a separate window.

Figure: Application maintenance, screen 1


All entries are valid, press PF10 to Save
 NSOA    1                 Application maintenance - A           01/11/94 17:06
 Command:      Action: U  Desk:           Appl: NSM-DEMO  Cmd Sec Grp:
 Val Sec Grp:           Parm:
-------------------------------------------------------------------------------
       Action: U  Application ID: NSM-DEMO                        Screen 1 of 2
 
       Application Name: NSM Demonstration Application
 Owner
 Desk ID  Desk Name                      Analyst   Analyst Name
 CHAOS    Converted for W. David Wimbe   WDW      Wimberly, W. David
 AVERNUS  Converted for Kathryn Cantre
 ASTRAEA  Converted for Lonnie Deavens
 ATLAS    Don Barnett
 
 
     Library: NSM-DEMO  Application Lock: U   X NSM Application
    Application Prefix: ND Application Prefix for Predict 'Fields':
    Value Security Maintenance Program:          Main Menu Command: MENU
 
 
 Entered: 08/03/92 Updated: 10/28/93 By: KATHRYN
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode RStrt             NextS       Save

Purpose and Usage

The Application maintenance function is used to add, view, update or delete information about Natural Applications. The permitted Action codes are: A, V, U or D respectively. Values for Application ID and Action are always required. To add or update information for an application, enter or replace valid values for the required fields. To view or delete, only the desired Application ID is necessary. PF10 is required to confirm Actions of A, U or D.

This is a two screen function. The first screen contains the primary application attributes. The second screen is used to define security levels and action attributes for NSM applications. The field validations and special processing associated with the second screen are documented separately.

The remaining sections address:

"Field Validations, screen 1"
"Special Processing, screen 1"
"Data Base Changes"

Field Validations, screen 1

The following edits are performed on the input data for screen one. Invalid entries will result in an error and must be corrected before any data base change is allowed.

Action

Validation

V,U,D

Application ID must exist on the APPLICATION file.

A

Application ID must not exist on the APPLICATION file.

A,U

Library is required.

A,U

Application Name must be non-blank.

A,U

Owner Desk IDs must be valid desks, and Analyst IDs must be valid users.

A,U

At least one valid Owner Desk ID and one valid Analyst ID are required. The primary owner responsible for the Application should be entered as the first Owner Desk ID and similarly for Analyst.

A,U

Application Prefix and Main Menu Command are required if the NSM Application switch is set to true.

D

No references to this application must exist in the MENU-COMMAND, APPLICATION-DESK, COMMAND-SECURITY, or VALUE-SECURITY files.

Special Processing, screen 1

Action

Special Processing

A

The NSM Application switch defaults to true.

A,U

Application Name is not translated to upper case on input.

A,U

Whenever an Owner Desk ID is entered, all of the Owner IDs' Names are retrieved from the DESK file and displayed.

A,U

Whenever an Analyst is entered, all of the Analysts' Names are retrieved from the USER file and displayed.

V,U,D

When PF4 is pressed, all the Owners' names, Analysts' names, and the Last Updated By name are retrieved from the appropriate files and displayed.

Data Base Changes

Data base changes are only performed if all data is valid and PF10 is entered.

Action

Effect on Data Base

A

A new record is stored on the APPLICATION file with the corresponding logical field assignments. Additional assignments include: APPLICATION-LOCK = U, DATE-ENTERED = current date, DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.

U

The existing record on the APPLICATION file for the specified Application ID is updated with the corresponding logical field assignments. Additional assignments include DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.

D

The record on the APPLICATION file for the specified Application ID is deleted.


A - Application maintenance, Screen 2

The Application maintenance, screen 2 figure is an example of the second screen of the Application maintenance function, or view an actual image of the second Application maintenance screen in a separate window.

Figure: Application maintenance, screen 2


All entries are valid, press PF10 to Save
 NSOA    1                 Application maintenance - A           01/11/94 17:06
 Command:      Action: U  Desk:           Appl: NSM-DEMO  Cmd Sec Grp:
 Val Sec Grp:           Parm:
-------------------------------------------------------------------------------
 Action: U  Application Id: NSM-DEMO                              Screen 2 of 2
 Security  1 = View                          Act Action Desc       MSL  Prot
 Levels &  2 = Add                            V  View               1    X
 Comments: 3 = Update                         A  Add                2
           4 = Delete                         U  Update             3
                                              D  Delete             4    X
                                              C  Copy               3
                                              R  Review             1    X
                                              W  Withdraw txn       1    X
 
 
 
 
 
 
 
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit        RStrt       PrevS NextR       Save

Purpose and Usage

Screen two of the Application maintenance function is used to view or maintain security level and action information for NSM applications. If security levels are used, they must be entered in the Security Levels & Comments area in the format:

v = description
The v denotes a one character security level value which must be followed by an equal sign. The actions must then be entered in list form accompanied by an action description, the minimum security level required by a user to perform that action (MSL) and a flag indicating whether the body of the screen should be protected from entry for that action (Prot).

The remaining sections address:

"Field Validations, screen 2"
"Special Processing, screen 2"

Field Validations, screen 2

The following edits are performed on the input data for screen two. Invalid entries will result in an error and must be corrected before any data base change is allowed.

Action

Validation

A,U

All minimum security levels (MSL) specified in the action list must occur in the Security Levels & Comments area followed by an equal sign.

Special Processing, screen 2

Action

Special Processing

A,U

The data base field VALID-SECURITY-LEVELS is constructed by concatenating all security level values parsed from the Security Levels & Comments area. This parsing is done by taking the first non-blank character from each line that contains an equal sign.


M - application Menu maintenance

The Menu maintenance figure is an example of the Menu maintenance function, or view an actual image of the Menu maintenance screen in a separate window.

Figure: Menu maintenance


Make changes and press ENTER to validate                                      
 NSOM    1 TEST               Menu maintenance - M               01/15/01 11:43
 Command:      Action: U  Desk:           Appl: NSM-MS    Cmd Sec Grp:         
 Val Sec Grp:           Parm:           Menu Cmd: MM                           
-------------------------------------------------------------------------------
  Action: U Appl: NSM-MS   Menu Cmd ID: MM      Entered:          Upd: 01/08/01
 Menu Cmd Desc: nsm maintenance system Main Menu                   By: WDW     
 Cmd  Description                              Required Keys                  T
 LAAC List All Available Commands              Command ID                     F
 MHAC Menu Hierarchy of Available Commands                                    F
 DAM  Desk Administrator's Menu                                               M
 ISM  Initialization and Setup Menu                                           M
 AAM  Application Administrator's Menu                                        M
 CDCD Change desk/Display Current Desk info                                   U
 LOG  LOGon to another natural application                                    U
 FIN  FINish your session (sign off natural)                                  U
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
                                                                               
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit        RStrt EdOpt       NextR       Save               

Purpose and Usage

The application Menu maintenance function is used to add, view, update, delete or copy information about the Natural Application's menus. The permitted Action codes are: A, V, U, D, or C respectively. Values for Appl ID, Menu Cmd ID, and Action are always required.

To add or update a menu command for an Appl ID, enter or replace valid values for the required fields. To view or delete, only the desired Application ID and Menu Command are necessary. To copy menu information from a record to either a new menu or an existing one, first display a source menu (a menu from which values will be copied). Next enter 'C' in the Action field and the Application ID and Menu Command ID to which values will be copied and press ENTER. PF10 is required to confirm and effect any change.

The remaining sections address:

"Field Validations"
"Special Processing"
"Data Base Changes"

Field Validations

Invalid entries will result in an error and must be corrected before any data base change is allowed.

Action

Validation

A,C

Appl ID must exist as APPLICATION-ID on the APPLICATION file.

A

Appl ID and Menu Cmd ID must not exist as APPLICATION-ID and MENU-COMMAND-ID on the MENU-COMMAND file.

A

Menu Cmd ID must not exist as a function on another menu within the Application.

V,U,D

Appl ID and Menu Cmd ID must exist as APPLICATION-ID and MENU-COMMAND-ID on the MENU-COMMAND file.

A,U,C

Menu Cmd ID Description is required.

A,U,C

At least two Cmds are required per menu.

A,U,C

Cmds must be unique and may not appear on multiple menus.

A,U,C

T (Command Type) must be 'M', 'F' or 'U'.

A,U,C

Cmd must already exist as a menu if T is 'M' and must not exist as a menu if T is 'F' or 'U'.

A,U,C

Command Description is required for function modules (command types F or U). If T is 'M', MENU-COMMAND-DESCRIPTION is retrieved from the MENU-COMMAND file via Appl Id and Menu Cmd Id and displayed in the Description field.

D

A Menu Cmd ID may not be deleted if it exists as a COMMAND-ID within Appl ID on the MENU-COMMANDS file.

A,U,C

A Cmd may not be the same as the MENU-COMMAND it resides on.

Special Processing

Action

Special Processing

A,U,C

Menu Cmd ID description, Description, and Required Keys fields are not translated to upper case on input.

Data Base Changes

Data base changes are only performed if all data is valid and PF10 is entered.

Action

Effect on Data Base

A

A new record is stored on the MENU-COMMAND file with the corresponding logical field assignments. Additional assignments include: DATE-OF-ENTRY and DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.

U

All the values for Cmd, Description, Required Keys, T, and Menu Cmd Id description are updated for the existing record on MENU-COMMAND. Additional assignments include: DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.

D

The existing record for the Appl ID and Menu Cmd ID are deleted.

C

If the Menu Cmd ID already exists for the Appl ID, the effective action of the Copy is an Update. If the Menu Cmd ID does not exist, the effective action is an Add. Data base changes are as noted above for the respective effective action.


LAA - List Applications of an Analyst

The following sections document the List Applications of an Analyst function:

"Purpose"
"Key fields"
"Decode processing"
"Related topics"

The List Applications of an Analyst figure is an example of the List Applications of an Analyst function, or view an actual image of the LAA screen in a separate window.

Figure: List Applications of an Analyst screen


Select an entry, press PF8 to page forward, or enter new keys
 NSOLAA  1            List Applications of an Analyst - LAA      01/12/94 09:23
 Command:      Action: U  Desk:           Appl: BIS       Cmd Sec Grp:
 Val Sec Grp:           Parm:           User: WDW       End Appl: 99999999
-------------------------------------------------------------------------------
   List for User: WDW        Wimberly, W. David
       starting from Appl: BIS      thru Appl: 99999999
 
             Application ID   Application Name
              _ BIS           Balance Inquiry System
              _ BOQSS         Batch Oasis Query Submission Sys
              _ BUDGET        UAF Budget System
              _ CS-ACCT       Computing Services Accounting
              _ DA-GRADS      Dev & Alumni - Gift Recording & Dues Sys
              _ DA-JOBS       Batch job library for DA-GRADS
              _ DA-RPTS       Dev/Alumni Report Library
              _ DHYATT        David Hyatt's Library
              _ DW85047       David Wimberly's library
              _ GJIM          General Journal Interface Module
 
          Applications 1     thru 10    of 32    are displayed
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode RStrt             Forwd

Purpose

The List Applications of an Analyst function is used to display applications for which a given user is an analyst. These applications are listed in sets of ten and include the application ID and name. Use PF8 to scroll forward through the list of applications. The display near the bottom of the screen indicates which set of applications is displayed and the total number of applications. PF5 will restart the list with the first set of applications. Application IDs may be marked for selection and further processing.

Users are defined as analysts of an application through the Application maintenance (A) function.

Key fields

User ID Identifies the user for which the list of applications is to be generated. A list of User IDs by user name can be obtained by pressing PF1 (Help) while the cursor is on this field. This list is in sequence of the name of the individual assigned to the ID.
Application ID Application ID is used as a starting search value for the list.
Ending Application ID Identifies the ending value for the list of applications. This field defaults to high values, but may be changed by the user.

Decode processing

PF4 is used to decode selected entries. To obtain additional information about the application, mark the desired application and press PF4. The application's total number of desks, command security groups, and value security groups and the date of the last notice for the application are displayed in a window.

Related topics



AAM - Application Administrator Menu

This menu contains the functions used by application administrators to grant access to applications, post notices for users of applications, temporarily restrict access to applications or to review these definitions in effect. The complete menu appears in Application Administrator Menu figure, or view an actual image of the AAM screen in a separate window.

Figure: Application Administrator Menu


Enter, mark or position cursor to desired command
 NSOMENU 1            Application Administrator Menu - AAM       01/11/94 10:28
 Command:      Action: V  Desk:           Appl:           Cmd Sec Grp:
 Val Sec Grp:           Parm:
-------------------------------------------------------------------------------
   CMD  Command description                      Required key fields
   ---- ---------------------------------------- ------------------------------
 _ CS   Command Security group maintenance       Appl & Cmd Sec Grp
 _ VS   Value Security group maintenance         Appl & Val Sec Grp
 _ AD   Application-Desk maintenance             Desk & Appl
 _ ADA  Application Default Access               Appl
 _ AN   Application Notice maintenance           Appl
 _ ALR  Application Lock/unlock & Reason         Appl
 _ CSLR Cmd Security group Lock/unlock & Reason  Appl & Cmd Sec Grp
 _ LUA  List Users of an Application             Appl & User
 _ LDC  List Desks for a Command security group  Appl & Cmd Sec Grp
 _ LDV  List Desks for a Value security group    Appl & Val Sec Grp
 _ LDA  List Desks for an Application            Desk & Appl
 _ LAO  List Applications of an Owner Desk       Desk & Appl
 _ CSQ  Command SeQuence list maintenance        Appl & Cmd Seq Name
 
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help        Quit

CS - application Command Security maintenance

The Command Security figure is an example of the Command Security group maintenance function, or view an actual image of the Command Security group maintenance screen in a separate window.

Figure: Command Security group maintenance


Make changes and press ENTER to validate
 NSOCS   1 TEST      Command Security group maintenance - CS     10/23/96 12:05
 Command:      Action: U  Desk:           Appl: NSM-MS    Cmd Sec Grp: SPEC
 Val Sec Grp:           Parm:
-------------------------------------------------------------------------------
  Action: U  Application Id: NSM-MS   Natural Secured Menus - Maintenance Sys
Cmd Sec Grp: SPEC     Desc: Test of the S -- as Specified -- Cmd A/D/S
Commands Allowed, Disallowed, or as Specified (A,D or S): S
 Cmd SL  Cmd SL  Cmd SL  Cmd SL  Cmd SL  Cmd SL  Cmd SL  Cmd SL  Cmd SL  Cmd SL
 ------  ------  ------  ------  ------  ------  ------  ------  ------  ------
 D    -
 UD   -
 LUD  -
 U    2
 ADA  2
 CS
 AD
 
 
 
 
Entered: 10/22/96 Updated: 10/23/96 By: WDW
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode RStrt ShowC       NextR       Save

Purpose and Usage

The application Command Security maintenance function is used to add, view, update, delete, or copy information about Natural Applications' Command Security Groups. The permitted Action codes are: A, V, U, D, or C respectively. Values for Application ID, Command Security Group, and Action are always required.

To add or update a Command Security Group, enter or replace valid values for the required fields. To view or delete, only the desired Application ID and Command Security Group are necessary. To copy command security group information to either a new command security group or an existing group, first view the source command security group (or enter values on the screen to be copied). Then enter 'C' in the Action field and the destination Command Security Group to which the screen values are to be copied and press ENTER. PF10 is required to confirm and effect any change.

The remaining sections address:

"Command Allowed, Disallowed, or as Specified"
"Field Validations"
"Special Processing"
"Data Base Changes"

Command Allowed, Disallowed, or as Specified

Command security is designed to provide the greatest flexibility possible to the application administrator while requiring a minimum of effort. This is accomplished by providing three options for defining command restrictions, which is indicated by the value entered into the Commands Allowed, Disallowed, or as Specified field.

A

An A indicates that the list of commands provided will be an inclusive list of all commands allowed. Any command not listed will not be available to users (desks) assigned this command security group. Further, a Security Level may be specified for selected commands. If provided (non-blank), that security level will be assigned to the user within that function if that level is less than the user's (desk's) normal security level.

D

D indicates that the list of commands provided are to be disallowed for the user. The user will be permitted access to all commands other than those listed, always with the user's normal security level.

S

S indicates that access to commands is provided as specified or with view only access when not specified. Any command not listed will be accessible by the user but with the most restrictive security level available within the application (normally this would be View only). Three additional options are available for those commands listed based upon the associated Security Level specification:

  • If left blank, access will be provided to the command with the user's normal security level.
  • If a valid Security Level is entered, access will be provided to the command with the lower value of either that security level or the user's normal security level. (The more restrictive of the two possibilities is used.)
  • If a '-' is entered (minus sign), access to the command is denied.
Using the as specified option offers the administrator the greatest flexibility since the only commands required to be listed are those where the user requires update access or from which the user should be denied access all together (even from view access).

Field Validations

Invalid entries will result in an error and must be corrected before any data base change is allowed.

Action

Validation

A

Appl (Application ID) and Cmd Sec Grp (Command Security Group) must not exist on the COMMAND-SECURITY file.

A,C

Appl (Application ID) must exist on the APPLICATION file.

V,U,D

Appl (Application ID) and Cmd Sec Grp (Command Security Group) must exist on the COMMAND-SECURITY file.

A,U,D

The desk ID of the operator must be an Application-Owner-Desk-ID on the APPLICATION file for this Application ID.

A,U.C

Desc (Command Security Group Description) is required, it cannot be left blank.

A,U,C

Cmd (commands) must be unique, a command cannot be repeated within this list.

A,U,C

Cmd (commands) must exist as valid Command-IDs on the MENU-COMMAND file for this Application Id.

A,U,C

Commands Allowed, Disallowed, or as Specified (A,D or S) is a required field and must be an A, D or S. On an Add, it is initialized to 'D'. If the action requested is a Copy, this field's value is copied from the source. The value S is only permitted for NSM version 2 applications (BASIS applications or any others generated using the UAF Program Generator).

A,U,C

SL (security level) can only be entered if Commands Allowed, Disallowed, or as Specified is an A or S. This value must be a valid security level for the application, as defined on screen 2 of the Application maintenance function (command A). Further, if Commands Allowed, Disallowed, or as Specified is S, this value may be an '-' indicating that this command is not allowed. See "Command Allowed, Disallowed, or as Specified" for additional information.

A,U,C

The Main-Menu-Command-ID for the application must be allowed or not disallowed.

D

A Command Security Group may not be deleted if any desk provided access to the application on the APPLICATION-DESK file (via command AD) has this same value.

Special Processing

Action

Special Processing

A,U,C

Cmd Sec Grp Desc is not translated to upper case on input.

A,U,C

PF6 is labeled as ShowC for show commands. When pressed, all commands defined for the application are retrieved and placed in the list of commands available on the screen. If modifications have been made on the screen and not saved, a warning message is displayed when PF6 is pressed that notifies the user that commands previously listed and any associated security levels are erased. Selected commands can then be blanked out as necessary. This function is useful when an application contains a large a number of commands that might be difficult to remember and enter.

V,U

When PF4 is pressed, the name of the user to last update the Command Security Group is retrieved from the USER file and displayed.

Data Base Changes

Data base changes are only performed if all data is valid and PF10 is entered.

Action

Effect on Data Base

A

A new record is stored on the COMMAND-SECURITY file with the corresponding field assignments. Additional assignments include: COMMAND-GROUP-LOCK = U, DATE-OF-ENTRY and DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.

U

The existing record on the COMMAND-SECURITY file is updated with the corresponding field assignments. Additional assignments include: DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.

D

The existing record on the COMMAND-SECURITY file is deleted.

C

If the Command Security Group exists for the Application ID, the effective action of the Copy is an Update. If the Command Security Group does not exist, the effective action is an Add. Data base changes are as noted above for the respective effective action.


VS - application Value Security maintenance

The Value Security maintenance figure is an example of the Value Security group maintenance function, or view an actual image of the Value Security maintenance screen in a separate window.

Figure: Value Security group maintenance


Please enter new key fields
 NSOVS   1            Value Security group maintenance - VS      08/30/93 09:37
 Command:      Action: V  Desk:           Appl: NSM-MS    Cmd Sec Grp: DM-ONLY
 Val Sec Grp: AVCF      Parm:
-------------------------------------------------------------------------------
  Action: V  Appl: NSM-MS    Val Sec Grp: AVCF
+-----------------------------------------------------------------------------+
| Press ENTER or PF3 to specify new keys                                      |
|                                                                             |
| Group description: Financial Affairs                                        |
|                                                                             |
| Permit unrestricted access (Y/N): N                                         |
|                                                                             |
| Restrict access to budgetary unit(s):                                       |
|  AVCF ASSO VICE CHAN FIN                                                    |
|                                                                             |
|                                                                             |
|                                                                             |
|                                                                             |
| Last updated: 08/19/93 By: WDW                                              |
|                                                                             |
| Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--    |
|                   Quit                                                N 3 V |
+-----------------------------------------------------------------------------+

Purpose and Usage

The Value Security maintenance function is used to add, view, update, or delete information about NSM applications' Value Security Groups on the VALUE-SECURITY file. The permitted Action codes are: A, V, U, or D respectively. Values for Application ID, Value Security Group, and Action are always required.

To add or update a Value Security Group, enter or replace valid values for the required fields. To view or delete, only the desired Application ID and Value Security Group are necessary. PF10 is required to confirm and effect any change.

Since value security requirements differ for all applications, value security maintenance is performed within a window which fills the main body of the screen. This window is presented and processed by different subprograms for each application. Because a subprogram handles the user inputs, the main program does not issue the standard warning when data is modified and the user's action will result in loss of those changes. Each subprogram must be customized for an application so that the fields needed by the application to apply record level restrictions can be defined. NSM accesses these restrictions at the time of user signon and passes this information to the function modules so that they can restrict access as necessary.

The remaining sections address:

"Field Validations"
"Special Processing"
"Data Base Changes"

Field Validations

Invalid entries will result in an error and must be corrected before any data base change is allowed.

Action

Validation

A

Application ID and Value Security Group must not exist on the VALUE-SECURITY file.

A

Application ID must exist on the APPLICATION file

V,U,D

Application ID and Value Security Group must exist on the VALUE-SECURITY file.

A,U,D

The desk of the operator must be an APPLICATION-OWNER-DESK-ID on the APPLICATION file for this Application ID.

A,U

Group description is required.

A,U

The fields used to define value based security for an application may have specific edit requirements which are enforced. The error messages displayed for these fields and help information available should adequately describe the necessary inputs.

D

A Value Security Group may not be deleted if any APPLICATION-DESK on the APPLICATION-DESK file has this same value in their VALUE-SECURITY-GROUP field.

Special Processing

Action

Special Processing

A,U

Group description is not translated to upper case on input.

Data Base Changes

Data base changes are only performed if all data is valid and PF10 is pressed.

Action

Effect on Data Base

A

A new record is stored on the VALUE-SECURITY file with the corresponding logical field assignments. Additional assignments include: DATE-OF-ENTRY and DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.

U

The existing record on the VALUE-SECURITY file is updated with the corresponding logical field assignments. Additional assignments include: DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.

D

The existing record on the VALUE-SECURITY file is deleted.


AD - Application Desk maintenance

The following sections document assignment of Desks to Applications.

"Purpose"
"Key fields"
"Actions"
"Decode processing"
"Related Topics"

The Application Desk maintenance figure is an example of the Application Desk maintenance function, or view an actual image of the AD screen in a separate window.

Figure: Application Desk maintenance


Press PF8 to view more records or enter new keys                              
 NSOAD   1 TEST         Application-Desk maintenance - AD        01/15/01 14:29
 Command:      Action: V  Desk:           Appl: LEAVE     Cmd Sec Grp:         
 Val Sec Grp:           Parm:                                                  
-------------------------------------------------------------------------------
  Action:  V  Appl: LEAVE    Leave Accounting                                  
              Desk:                                                            
                                            Sec    Job      Command     Value  
  Desk Id    Name                           Lvl Sec Class  Sec Group  Sec Group
                                                                               
  ACHERON    Converted for Eric Robinson     9              USERTEST   ER      
  ADMETUS    Converted for Cathy Renner      9              USERTEST   CR      
  AETHER     Converted for Lisa Danley       7              DEPTREP    COMP    
  APPLE      Desk for Wilma Carr             9              USERTEST   WC      
  ARACHNE    Programmer on Basis             9   A          ALL        COMP    
  ARES       Converted for Allen Fields      9   A          ALL        COMP    
  ARGUS      Duchess of Time Travel          9   A          ALL        COMP    
  ASH        Desk for GLTST06                9              DEPTREP    LVADMIN 
  ASTRAEA    Converted for Lonnie Deavens    9              ALL        COMP    
  ATLAS      Don Barnett                     9              ALL        COMP    
                                                                               
                                                                               
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode                   Forwd                          

Purpose

The Application Desk maintenance function is used to maintain the assignments of desks to Natural Secured Menus (NSM) applications. An assignment of a desk to an application consists of granting access and establishing security for that desk within the application. This screen has been designed so that more than one record may be updated at one time. A maximum of ten desks are displayed on a screen.

Key fields

Action Possible values for action include V (View), A (Add), U (Update), and D (Delete). Only an owner of the Application may Add, Update, or Delete Application-Desk assignments. See "Actions" for descriptions of these types of processing.
Application ID A list of valid Application IDs may be obtained by pressing PF1 (Help) while the cursor is positioned on this field.
Desk ID Desk ID is required to Add or Delete a specific assignment of the Desk to the Application. To View or Update, Desk ID is used as a starting value so that up to ten records may be viewed or updated at one time. A list of Desk IDs by user name may be obtained by pressing PF1 (Help) while the cursor is positioned on this field.

Actions

The following actions are possible for this function. Use of some actions may be restricted for some users. No data will be created, modified, or deleted until PF10 is pressed.

View (Display existing Application-Desk assignments)

To view Application-Desk assignments, enter in the banner a 'V' in the Action field and a valid Application ID. If desired, a starting value for Desk ID may be entered. All Application-Desk records found after that starting value for the specified Application will be displayed. PF8 may be used to scroll forward to view the remaining Desks assigned to that Application.

Add (Create a new Application-Desk assignment)

To assign a Desk to an Application, enter in the banner an 'A' in the Action field, the Desk ID, and the Application ID. Only one Desk assignment can be created at a time. The first line of the list will contain the Desk ID that is being assigned access to the specified Application. This will be the only line where data entry is permitted. If there are Desks assigned to the Application that fall alphabetically after the new Desk ID, they will be listed but will be protected from entry. Enter the desired values for the remaining fields. Job Security Class and Value Security Group are only required if the Application uses these types of security.

Update (Modify existing Application-Desk assignments)

To update existing Application-Desk assignments, enter in the banner a 'U' in the Action field and the Application ID for which desk assignments have been made. If desired, a starting value for Desk ID may also be entered. Up to ten Desk IDs will be displayed, beginning with the Desk ID entered in the banner, and all those listed may be modified. PF8 may be used to scroll through records on an Update, but PF10 must be pressed prior to pressing PF8 to save any changes made to the Application-Desk records displayed.

Delete (Delete an existing Application-Desk assignment)

To delete an existing Application-Desk assignment, enter in the banner a 'D' in the Action field, the required Application ID, and Desk ID. As with Add, only one Application-Desk assignment can be deleted at a time.

Decode processing

To see additional information about the Application-Desk assignment, position the cursor anywhere on the line of the desired entry and press PF4. A window will display the date of entry, date of last update, and the Natural ID of the user who last updated the Application-Desk assignment. Additionally, descriptions for the command security group and value security group will be shown.

Related Topics


ADA - Application Default Access

The following sections document the Application Default Access function:

"Purpose"
"Key fields"
"Actions"
"Decode Processing"
"Related topics"

The Application Default Access figure is an example of the Application Default Access maintenance function, or view an actual image of the ADA screen in a separate window.

Figure: Application Default Access maintenance


All entries are valid, press PF10 to Save
 NSOADA  1              Application Default Access - ADA         08/30/93 09:40
 Command:      Action: U  Desk:           Appl: BIS       Cmd Sec Grp: DM-ONLY
 Val Sec Grp: AVCF      Parm:
-------------------------------------------------------------------------------
  Action: U  Appl: BIS       Balance Inquiry System
 
 
      Default Access Permitted? (Y/N)  Y
      Default Security Level: 5
      Default Command Security Group: NORM
                                      Command security for normal users
      Default Value Security Group: NO04
                                    No 04 companies
 
 
 
 
 
 
   Entered:          Updated: 03/04/93 By: EORWIG
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode RStrt             NextR       Save

Purpose

The Application Default Access function is used to establish or eliminate default access for an application. Only an application owner can determine if the application can have default access and assign the security definitions for that access. If an application has been defined by this function as allowing default access, then any user may logon to the application. The user's security and the accessible commands are based upon the assignments defined in this function.

Key fields

Action Possible values for action are V (View) and U (Update). See "Actions" for descriptions of these types of processing.
Application ID A list of valid Application IDs may be obtained by pressing PF1 (Help) while the cursor is positioned on this field.

Actions

The following actions are possible for this function. Use of the Update action may be restricted for some users. No data will be modified until PF10 is pressed.

View (Display Application Default Access information)

To view information about an application's default access availability and default security definitions, enter in the banner a 'V' in the Action field and the desired Application ID.

Update (Modify an Application's Default Access information)

To modify an application's default access availability and default security definitions, enter in the banner a 'U' in the Action field and the desired Application ID. To allow default access for the application, enter 'Y' in the Default Access Permitted field. A security level and command security group are required so that default security can be properly defined. If the application uses security by value, a default value security group is also required. To eliminate default access for the application, enter an 'N' in the Default Access Permitted field. The remaining fields that assign default security definitions will be reset to blank because they are not needed if default access is not permitted.

Decode Processing

PF4 (DCode) can be used to display the names of the command security and value security groups that have been defined for default access.

Related topics


AN - Application Notice maintenance

The Application Notice maintenance figure is an example of the Application Notice maintenance function, or view an actual image of the AN screen in a separate window.

Figure: Application Notice maintenance


Please enter new key fields
 NSOAN   1             Application Notice maintenance - AN       08/30/93 09:42
 Command:      Action: V  Desk:           Appl: DA-GRADS  Cmd Sec Grp:
 Val Sec Grp: AVCF      Parm:
-------------------------------------------------------------------------------
Action: V Appl: DA-GRADS Dev & Alumni - Gift Recording & D Eff Date: 01/19/1990
   *
   *
   *    The DA-GRADS application is now in production.  You have accessed
   *    the TEST system.  To access production, enter CICSPROD from the
   *    VMVTAM menu.  The test system is available for testing.
   *
   *
 
 
 
 
 
 
 
 
Entered:          Last Updated: 08/17/93 By: WDW
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode                   NextR

Purpose and Usage

The Application Notice maintenance function is used to add, view, update, delete, or copy a Notice associated with a specific existing Natural Application on the APPLICATION file. This notice will be automatically displayed to any user when they logon to the application if their DATE-LAST-LOGGED-ON on the APPLICATION-USER file is before the DATE-NOTICE on the APPLICATION.

The permitted Action codes are: A, V, U, D, or C respectively. Values for Application ID and Action are always required.

To add or update, enter or replace valid values for the required fields. To view or delete, only the desired Application ID is necessary. To copy a notice to another application, display the source application's notice and enter 'C' in the Action field and the Application ID to which the notice is to be copied. The effective action of a Copy is always an Update. PF10 is required to confirm and effect any change.

The remaining sections address:

"Field Validations"
"Special Processing"
"Data Base Changes"

Field Validations

Invalid entries will result in an error and must be corrected before any data base change is allowed.

Action

Validation

A,V,U,D,C

Appl ID must exist on the APPLICATION file

A,U,C

The notice text must be non-blank.

A,U,C

Eff Date (Effective Date) must be greater than or equal to the current system date.

A,U,D,C

Only an owner whose desk is one of the APPLICATION-OWNER-DESK-IDs or an analyst whose user ID is an APPLICATION-ANALYST on the APPLICATION file for this Application ID may update/delete the notice Eff Date or text.

Special Processing

Action

Special Processing

A,U,C

Notice text is not translated to upper case on input.

V,U,C,D

When PF4 is pressed, the name of Last Updated By (UPDATED-BY-USER) is retrieved from the USER file and displayed.

Data Base Changes

Data base changes are only performed if all data is valid and PF10 is entered.

Action

Effect on Data Base

A,U,C

The DATE-NOTICE and the NOTICE fields on the APPLICATION file for the Application ID entered are updated with the contents of Eff Date and the notice text. Additional assignments include: DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID, and DATE-OF-ENTRY = current date (for an Add).

D

The existing values for DATE-NOTICE and NOTICE on the APPLICATION file are updated with blanks and zeros respectively. Additional assignments include: DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.


ALR - Application Lock/unlock Reason maintenance

The Application Lock/unlock Reason figure is an example of the Application Lock/unlock and Reason maintenance function, or view an actual image of the ALR screen in a separate window.

Figure: Application Lock/unlock and Reason


All entries are valid, press PF10 to Save
 NSOALR  1           Application Lock/unlock & Reason - ALR      08/30/93 09:43
 Command:      Action: U  Desk:           Appl: DA-GRADS  Cmd Sec Grp:
 Val Sec Grp: AVCF      Parm:
-------------------------------------------------------------------------------
   Action: U   Appl: DA-GRADS  Dev & Alumni - Gift Recording & Dues Sys
   Lock/Unlock:  L
   Reason for locking the application:
 
    Sample explanation of why an application may
 
    be locked up and when it will again become
 
    available.
 
 
 
 
 
     Entered:           Last Updated: 08/17/93
                                  By: WDW
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode RStrt             NextR       Save

Purpose and Usage

The Application Lock/unlock and Reason maintenance function is used to view or update lock/unlock data associated with a specific existing Natural Application on the APPLICATION file. The reason text should contain an estimated date/time for the application to be unlocked. The permitted Action codes are: V or U, respectively. Values for Application ID and Action are always required.

To update, replace the desired fields with valid values. To view, only the desired Application ID is necessary. PF10 is required to confirm and effect any change.

The remaining sections address:

"Field Validations"
"Special Processing"
"Data Base Changes"

Field Validations

Invalid entries will result in an error and must be corrected before any data base change is allowed.

Action

Validation

V,U

Application ID must exist on the APPLICATION file.

U

The desk of the operator must be a valid APPLICATION-OWNER-DESK-ID or the operator's user ID must be an APPLICATION-ANALYST on the APPLICATION file for this Application ID.

U

If Lock/unlock is 'L', the Reason for locking the application cannot be blank.

U

If Lock/unlock is 'U' the REASON-APPLICATION-LOCKED will be blanked on update to the APPLICATION file for the Application ID.

Special Processing

Action

Special Processing

U

The Reason for locking the application text is not translated to upper case on input.

V,U

When PF4 is pressed, the name of Last Updated By (UPDATED-BY-USER) is retrieved from the USER file and displayed.

Data Base Changes

Data base changes are only performed if all data is valid and PF10 is entered.

Action

Effect on Data Base

U

If Lock/unlock is 'L' the APPLICATION-LOCKED and REASON-APPLICATION-LOCKED fields are updated on the APPLICATION file with Lock/unlock and 'Reason' text for the Application ID. If Lock/unlock is 'U' the APPLICATION-LOCKED field is updated with 'U' and the REASON-APPLICATION-LOCKED field is updated with blanks on the APPLICATION file for the Application ID. The corresponding logical field are always updated DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.


CSLR - Command Security group Lock/unlock and Reason

The Command Security group Lock/unlock and Reason figure is an example of the Command Security group Lock/unlock and Reason function, or view an actual image of the CSLR screen in a separate window.

Figure: Command Security group Lock/unlock and Reason


Specified key does not exist; make changes and press ENTER to validate
 NSOCSLR 1       Cmd Security group Lock/unlock & Reason - CSLR  08/30/93 09:44
 Command:      Action: U  Desk:           Appl: DA-GRADS  Cmd Sec Grp:
 Val Sec Grp: AVCF      Parm:
-------------------------------------------------------------------------------
   Action: U   Appl: DA-GRADS   Dev & Alumni - Gift Recording & Dues Sys
 
         Cmd-Sec-Grp  Lock/Unlock     Cmd-Sec-Grp  Lock/Unlock
          ALL              U
          ALLTBL           U
          NOMAD            l
 
 
 
          Reason Command Security Groups Locked:
          Sample of locking one command security group
          out of an application.
 
 
 
 
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit        RStrt UnLok                   Save

Purpose and Usage

The Command Security group Lock/unlock and Reason function is used to view or update information about Natural Applications' Command Security Groups lock/unlock status and reason for the lock. This information is contained on the COMMAND-SECURITY file and APPLICATION file respectively for an Application ID. The permitted Action codes are: V or U, respectively. A value for Application ID is always required.

To update, replace the desired fields with valid values. To view, only the desired Application ID is necessary. A maximum of 10 Cmd Sec Grps are displayed on a screen, and PF8 can be used to scroll through the Cmd Sec Grps for the specified Application Id. PF10 is required to confirm and effect any change.

The remaining sections address:

"Field Validations"
"Special Processing"
"Data Base Changes"

Field Validations

Invalid entries will result in an error and must be corrected before any data base change is allowed.

Action

Validation

V,U

Application ID must exist on the COMMAND-SECURITY file.

V,U

Cmd Sec Grp, if entered in the command-key area and if it exists on the COMMAND-SECURITY file for this Application ID, will be the first of the ten Cmd Sec Grps listed to be locked or Unlocked. If the Cmd Sec Grp entered does not exist, the first ten existing COMMAND-SECURITY-GROUPS within the Application ID after the specified Cmd Sec Grp will be listed.

V,U

At least one COMMAND-SECURITY-GROUP must exist for this Application Id on the COMMAND-SECURITY file.

U

The desk of the operator must be an APPLICATION-OWNER-DESK-ID on the APPLICATION file for this Application.

U

Lock/Unlock is a required field and must be L or U for all listed Cmd Sec Grps.

U

Reason Command Security Groups Locked text is required.

Special Processing

Action

Special Processing

U

Reason Command Security Groups Locked text is not translated to upper case on input.

U

When PF6 is pressed, all the Cmd Sec Grps will be assigned an Unlock status.

U,V

Cmd Sec Grps will be displayed in groups of ten starting with the first COMMAND-SECURITY-GROUP within the Application ID or the Cmd Sec Grp entered. Pressing PF8 will page forward through the Cmd Sec Grps.

Data Base Changes

Data base changes are only performed if all data is valid and PF10 is entered.

Action

Effect on Data Base

U

The existing records on the COMMAND-SECURITY file for the Application Id and Cmd Sec Grps are updated with the corresponding COMMAND-GROUP-LOCK = Lock/Unlock.

The existing record on the APPLICATION file for the Application ID is updated with REASON-CSG-LOCKED = Reason Command Security Groups Locked text.

The COMMAND-SECURITY file is updated with the corresponding logical field assignments: DATE-LAST-UPDATED = current date and LAST-UPDATED-BY = current Natural user ID.


LUA - List Users of an Application

The following sections document the List Users of an Application function:

"Purpose"
"Key fields"
"Decode processing"
"Related topics"

The List Users of an Application figure is an example of the List Users of an Application function, or view an actual image of the LUA screen in a separate window.

Figure: List Users of an Application


Select an entry, press PF8 to page forward, or enter new keys
 NSOLUA  1             List Users of an Application - LUA        08/30/93 09:45
 Command:      Action: U  Desk:           Appl: GJIM      Cmd Sec Grp:
 Val Sec Grp: AVCF      Parm:           User:
-------------------------------------------------------------------------------
  List for Appl: GJIM     starting from
 
 
         User        LastLogon   Name                               BUNIT
       _ AP001                   Lester, Tina                       AVCF
       _ AP04                    Omohundro, Doris                   AVCF
       _ AVCF001     08/19/93    Briney, Colleen                    AVCF
       _ AVCF002     05/21/93    Danley, Lisa                       AVCF
       _ AVCF01      06/29/93    Stolfi, Larrie                     AVCF
       _ AVCF02      08/18/93    Bronaugh, Jim                      AVCF
       _ AVCF07      08/13/93    Shaw, Phyllis                      AVCF
       _ BKENNED     07/28/93    Kennedy, Bobbie                    AVCF
       _ BMOODY                  Moody, Bill                        CAUD
       _ BROMLEY     08/12/93    Bromley, Katrina                   COMP
 
                    Users 1     thru 10    displayed
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode RStrt             Forwd

Purpose

The List Users of an Application function is used to display users of an application, anyone that has ever logged onto the application. These users are listed in sets of ten and include the user ID and the date of the last logon to the application. Use PF8 to scroll forward through the list of users. The display near the bottom of the screen indicates which set of users is displayed and the total number of users. PF5 will restart the list with the first set of users. User IDs may be marked for selection and further processing.

Users are created through the User maintenance (U) function.

Key fields

Application ID Identifies the application for which the list is generated. A list of valid application IDs may be obtained by pressing PF1 (Help) while the cursor is on this field.
User ID User ID is used as a starting search value such that all users with an ID equal to or greater than that value are listed. A blank ID will obtain a complete list of the users of the application. A list of assigned User IDs displayed in user name order may be obtained by pressing PF1 (Help) while the cursor is on this field.

Decode processing

PF4 is used to decode all entries in the list. To obtain the user name and the budgetary unit to which the ID is assigned, press PF4.

Related topics


LDC - List Desks for a Command security group

The following sections document the List Desks for an Command security group function:

"Purpose"
"Key fields"
"Decode processing"
"Related topics"

The List Desks for a Command security group figure is an example of the List Desks for a Command security group function, or view an actual image of the LDC screen in a separate window.

Figure: List Desks for a Command security group


Select an entry, press PF8 to page forward, or enter new keys
  Desk name and BUNIT decoded                               LDC  07/28/94 10:16
 Command:      Action: V  Desk:           Appl: LEAVE     Cmd Sec Grp: ALL
 Val Sec Grp:           Parm:
-------------------------------------------------------------------------------
  Appl: LEAVE    Cmd Sec Grp: ALL      Allow access to all commands
 
              Sec  Value
     Desk     Lvl Sec Grp   Desk Name                                 BU
   _ ARGUS     9  COMP      Converted for Katrina Bromley             COMP
   _ AUSTER    9  LVADMIN   Converted for Joy Steely                  COMP
   _ CHAOS     9  COMP      Converted for W. David Wimberly           COMP
   _ AVERNUS   9  COMP      Converted for Kathryn Cantrell            COMP
   _ ATLAS     9  COMP      Don Barnett                               COMP
   _ COCYTHUS  9  LVADMIN   Converted for Bill Overby                 HMRS
   _ BRIAREUS  9  COMP      Converted for Paul Bixby                  COMP
   _ CEPHALUS  9  COMP      Converted for Sandra Twiggs               COMP
   _ ARACHNE   9  COMP      Converted for Ava Findahl                 COMP
   _ FSTC      9  LVADMIN   Financial Systems Training Coordinator    AVCF
 
             Desks 1     thru 10    of 12    displayed
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode RStrt             Forwd

Purpose

The List Desks for a Command security group function is used to display desks with a given command security group for the specified application. These desks are listed in sets of ten and include the desk ID, security level, and value security group. Use PF8 to scroll forward through the list of desks. The display near the bottom of the screen indicates which set of desks is displayed and the total number of desks. PF5 will restart the list with the first set of desks. Desk IDs may be marked for selection and further processing.

Desks are granted access to applications through the Application-Desk (AD) function.

Key fields

Application ID Identifies the application for which the list is generated. A list of valid application IDs may be obtained by pressing PF1 (Help) while the cursor is on this field.
Command Security Group Identifies the command security group of the specified application for which the list is generated.

Decode processing

PF4 is used to decode all entries in the list. To obtain the desk name and the budgetary unit associated with the desk, press PF4.

Related topics


LDV - List Desks for a Value security group

The following sections document the List Desks for an Value security group function:

"Purpose"
"Key fields"
"Decode processing"
"Related topics"

The List Desks for a Value security group figure is an example of the List Desks for a Value security group function, or view an actual image of the LDV screen in a separate window.

Figure: List Desks for a Value security group


Select an entry or enter new keys
 NSOLDV  1         List Desks for a Value security group - LDV   08/30/93 09:47
 Command:      Action: U  Desk:           Appl: NSM-MS    Cmd Sec Grp: CORETEAM
 Val Sec Grp: AVCF      Parm:
-------------------------------------------------------------------------------
  Appl: NSM-MS   Val Sec Grp: AVCF     Financial Affairs
 
              Sec   Cmd
     Desk     Lvl Sec Grp   Desk Name                                 BUNIT
   _ FSTC      7  AA+DM     Financial Systems Training Coordinator    AVCF
 
 
 
 
 
 
 
 
 
 
             Desks 1     thru 1     of 1     displayed
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode RStrt

Purpose

The List Desks for a Value security group function is used to display desks with a given value security group for the specified application. These desks are listed in sets of ten and include the desk ID, security level, and command security group. Use PF8 to scroll forward through the list of desks. The display near the bottom of the screen indicates which set of desks is displayed and the total number of desks. PF5 will restart the list with the first set of desks. Desk IDs may be marked for selection and further processing.

Desks are granted access to applications through the Application-Desk (AD) function.

Key fields

Application ID Identifies the application for which the list is generated. A list of valid application IDs may be obtained by pressing PF1 (Help) while the cursor is on this field.
Value Security Group Identifies the value security group of the specified application for which the list is generated.

Decode processing

PF4 is used to decode all entries in the list. To obtain the desk name and the budgetary unit associated with the desk, press PF4.

Related topics


LDA - List Desks for an Application

The following sections document the List Desks for an Application function:

"Purpose"
"Key fields"
"Related topics"

The List Desks for an Application figure is an example of the List Desks for an Application function, or view an actual image of the LDA screen in a separate window.

Figure: List Desks for an Application


Select an entry, press PF8 to page forward, or enter new keys
 NSOLDA  1             List Desks for an Application - LDA       08/30/93 09:48
 Command:      Action: U  Desk:           Appl: GJIM      Cmd Sec Grp: CORETEAM
 Val Sec Grp: AVCF      Parm:
-------------------------------------------------------------------------------
  List for Appl: GJIM     starting from
 
            Sec  Value      Cmd
   Desk ID  Lvl Sec Grp   Sec Grp   Desk Name                             BUNIT
 _ ADONIS    6            CORETEAM  Converted for Craig A. Brown          AVCB
 _ AEACUS    6            CORETEAM  Converted for Donna Carter            AVCB
 _ AEETES    6            CORETEAM  Converted for Daniel Jones            AVCB
 _ AEGEUS    6            CORETEAM  Converted for William Rains           AVCB
 _ AEGYPTUS  6            CORETEAM  Converted for Tina Lester             AVCF
 _ AEOLUS    6            CORETEAM  Converted for Doris Omohundro         AVCF
 _ AESON     6            CORETEAM  Converted for Colleen Briney          AVCF
 _ AETHER    6            CORETEAM  Converted for Lisa Danley             AVCF
 _ AGIAIA    6            CORETEAM  Converted for Larrie Stolfi           AVCF
 _ AJAX      6            CORETEAM  Converted for Jim Bronaugh            AVCF
 
                    Desks 1     thru 10    displayed
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode RStrt             Forwd

Purpose

The List Desks for an Application function is used to display desks that have been granted access to an application. These desks are listed in sets of ten and include the desk ID, desk name, and the desk's budgetary unit. Use PF8 to scroll forward through the list of desks. The display near the bottom of the screen indicates which set of desks is displayed and the total number of desks. PF5 will restart the list with the first set of desks. Desk IDs may be marked for selection and further processing.

Desks are granted access to applications through the Application-Desk (AD) function.

Key fields

Desk ID Desk ID is used as a starting value. A list of assigned Desk IDs displayed in user name order may be obtained by pressing PF1 (Help) while the cursor is on this field.
Application ID Identifies the application for which the list is generated. A list of valid application IDs may be obtained by pressing PF1 (Help) while the cursor is on this field.

Related topics


LAO - List Applications of an Owner

The following sections document the List Applications of an Owner function:

"Purpose"
"Key fields"
"Decode processing"
"Related topics"

The List Applications of an Owner figure is an example of the List Applications of an Owner function, or view an actual image of the LAO screen in a separate window.

Figure: List Applications of an Owner


Select an entry, press PF8 to page forward, or enter new keys
 NSOLAO  1          List Applications of an Owner desk - LAO     01/12/94 09:49
 Command:      Action: U  Desk: CHAOS     Appl: C         Cmd Sec Grp:
 Val Sec Grp:           Parm:
-------------------------------------------------------------------------------
   List for Desk: CHAOS     Converted for W. David Wimberly
              starting from Appl: C
 
             Application ID   Application Name
              _ DA-GRADS      Dev & Alumni - Gift Recording & Dues Sys
              _ DA-JOBS       Batch job library for DA-GRADS
              _ DA-RPTS       Dev/Alumni Report Library
              _ DHYATT        David Hyatt's Library
              _ DW85047       David Wimberly's library
              _ GJIM          General Journal Interface Module
              _ HRLY-TS       Hourly Time Sheets
              _ HRMS          Human Resource Management System
              _ INRS          Institutional Research Application
              _ JOBS          Job Submission Application
 
          Applications 1     thru 10    of 35    are displayed
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode RStrt             Forwd

Purpose

The List Applications of an Owner function is used to display applications for which a given desk is an owner. These applications are listed in sets of ten and include the application ID and name. Use PF8 to scroll forward through the list of applications. The display near the bottom of the screen indicates which set of applications is displayed and the total number of applications. PF5 will restart the list with the first set of applications. Application IDs may be marked for selection and further processing.

Desks are defined as owners of an application through the Application maintenance (A) function.

Key fields

Desk ID Identifies the desk for which the list of applications is to be generated. A list of Desk IDs by user name can be obtained by pressing PF1 (Help) while the cursor is on this field. This list is in sequence of the name of the individual assigned to the desk.
Application ID Application ID is used as a starting search value for the list.

Decode processing

PF4 is used to decode selected entries. To obtain additional information about the application, mark the desired application and press PF4. The application's total number of desks, command security groups, and value security groups and the date of the last notice for the application are displayed in a window.

Related topics


CSQ - Command SeQuence maintenance

The following sections document the Command Sequence function:

"Purpose"
"Key fields"
"Actions"
"Special validations"

The Command Sequence maintenance figure is an example of the Command SeQuence maintenance function, or view an actual image of the CSQ screen in a separate window.

Figure: Command Sequence maintenance


Please enter new key fields
  De-coding has been performed                              CSQ  07/28/94 14:43
 Command:      Action: V  Desk:           Appl: GJIM      Cmd Sec Grp:
 Val Sec Grp:           Parm:           Cmd Seq: TESTACT
-------------------------------------------------------------------------------
 Action: V Appl: GJIM     Command Sequence: TESTACT
 Command Sequence Description: Testing the Action Field
 
                Action  Cmd                 Description
                   V    JEM    Journal Entry Maintenance
                   U    JEM    Journal Entry Maintenance
                   V    JETP   Journal Entry TARGET Processing
                        JEM    Journal Entry Maintenance
 
 
 
 
 
 
 
    Entries   1 thru   4 of   4 displayed; maximum allowed:  10
 
Enter-PF1---PF2---PF3---PF4---PF5---PF6---PF7---PF8---PF9---PF10--PF11--PF12---
      Help  Suspd Quit  DCode                   NextR

Purpose

The Command SeQuence maintenance function is used to create and maintain a series of two or more commands that are used in conjunction with each other to accomplish a particular task. Multiple command sequences are allowed within an application and the commands in those sequences are performed via the List Command SeQuence (LCSQ) function that exists in each application. Normally all commands in a sequence operate on the same banner key (or group of keys). The objective of this function is to prevent repetitive command entry for each new key entered in the banner.

An example of how this function might be used is when data for a particular entity (e.g. Personnel ID, Vendor Number, etc.) is to be maintained and there are multiple functions required to access all of the fields. The entity's banner key is entered one time and then LCSQ is used to access all of the required commands with the indicated action (in the order listed). Upon return to the list a new key is entered in the banner and the sequential execution of commands is repeated. Note that because the commands are sequential executed in LCSQ, it is important that are listed in the order in which they are to be executed.

Key fields

Action Possible values for action include V (View), A (Add), U (Update) and D (Delete). See topic "Actions" for descriptions of these types of processing.
Appl A list of Application IDs can be obtained by pressing PF1 (Help) while the cursor is positioned on this field. This list is in alphabetical order.
Cmd Seq The Command Sequence Name is a unique name given to each command sequence within an application.

Actions

The following actions are possible for this function. Use of some actions may be restricted for some users. No data will be created, modified, or deleted until PF10 is pressed.

View (Display existing Command SeQuences)

To view an existing command list, enter in the banner a 'V' in the Action field and the desired Application ID and Command Sequence Name.

Add (Create new Command SeQuences)

To create a new command sequence, enter in the banner an 'A' in the Action field, the desired Application ID, and the new Command Sequence Name. Enter the command sequence Description and valid Command IDs.

Update (Modify existing Command SeQuences)

To modify an existing command sequence, enter in the banner a 'U' in the Action field, the desired Application ID, and the Command Sequence Name. Modify the command sequence Description and/or enter (or change) Command IDs.

Delete (Delete existing Command SeQuences)

To delete an existing command list, enter in the banner a 'D' in the Action field, the desired Application ID, and the Command Sequence Name.

Special validations

To add, modify, or delete a command list, the Application ID must exist and the operator's desk must be an APPLICATION-OWNER for the application entered. Any desk, however, that has access to the Command SeQuence function may view any command sequence in any application.

A Command Sequence Name must be unique within a given application.


Miscellaneous


Procedures

There are three distinct groups of users for this system, Computing Services,the application administrators, and the departmental desk administrators. The following procedures will be required by each group to use the NSM-MS System.

First, Computing Services will design the online application to conform to the requirements of the NSM Architecture. The functional specifications available for the NSM Architecture provide the necessary information. Also, Computing Services will be responsible for adding and maintaining Users, Applications, and Application Menu Command data on the Natural Secured Menu files via the NSM-MS System. Finally, Computing Services will enforce security within each application command by designing and coding the appropriate restrictions into the function module programs.

Departmental desk administrators will be responsible for defining and maintaining desks under their budgetary unit(s). The assignment of individuals to those desks is also a responsibility of the desk administrator.

Each NSM application administrator will be responsible for establishing and maintaining the security data required by the application via the NSM Maintenance System. This will include establishing and maintaining valid Application-Desks, Command-Security-Groups, and Value-Security-Groups. The owner will be responsibile for maintaining application default access availability and the associated default security definitions for such access. Also, the administrator will be allowed to Lock/Unlock Applications and Command-Security-Groups as well as enter the associated reason/messages. Last, the administrator can maintain an Application-Notice to communicate pertinent information to all Users that logon to their application.


Data Entry Sequence

Data validation requirements within NSM-MS mandate that data be established in a certain order. For example, the application owner (administrator) must exist in the User file before an Application can be added. The list of functions provided below identifies the required sequence for setting up new users in a new application.
U User maintenance
A Application maintenance
M application Menu maintenance
D Desk maintenance
UD User Desk maintenance
CS application Command Security maintenance
VS application Value Security maintenance (optional)
AD Application Desk maintenance
The first three steps must be performed by Computing Services. The next two steps, which deal with desk definition and assignment, must be completed by the departmental desk administrator. The remaining steps are the responsibility of the application administrator (owner).