Define Additional Access Attribute Criteria

Explanation

This activity is used to define the Field Configuration table in Access Attribute. This table controls what changes can be made to the data stored inside the logical unit.

There are two types of records present in the table:

Navigate to Access Attribute. Select the protected logical unit from the graphical object structure and expand the structure to search for the relevant Attribute ID.

In the Column Name field, use the list of values to select the column that holds data that you want to control. For example, the ExpenseHeader logical unit has the EXPENSE_STATUS column in it. This column stores data about authorizations of expense status.

The Key Column field is used by records that specify what kind of key information is used to identify data.

The Old Value field specifies what values can be changed by an owner of the access attribute. The attribute owner can change data only if they match contents of the Old Value field. For example, if the EXPENSE_STATUS column has Old Value set to Approved, the supervisor will be able to modify the expense only when it is approved. If the Old Value field is left empty, the attribute owner can modify all data stored in the column.

The New Value field specifies what new values can be set by the owner of the access attribute. The attribute owner can change data only to what is listed in the Old Value field. For example, if the EXPENSE_STATUS column has New Value set to Authorize, the supervisor will be able only to authorize the expense. If left empty, the owner will be able to modify the data to any state.

You can use following operators on New Value and Old Value fields:

Note: Semi colon can be used to enter multiple values with the operators, where applicable.

In the Attribute Value field, you can select one of the following:

Prerequisites

In order to perform this activity, an access attribute has to be created.

System Effects

As a result of this activity, additional access criteria will be added to an access attribute to determine who has access and/or what actions can be performed on the data..