Release 10.1A: OpenEdge Development:
Progress Dynamics Repository Reference
gsm_token table — gsmto
This table contains the definitions of security tokens.
Table 11–11 lists the table’s FLA, fields, and foreign keys.
Table 11–12 gives details of the table’s indexes.
Table 11–12: gsm_token index information Index name Elements Type XPKgsm_token token_obj Primary Unique XAK1gsm_token token_code Unique XIE1gsm_token token_description Nonunique
Tokens are used in the application to control access to functions the user can perform within a program using tab folder page names and button names.
Tokens can be created for any tab page names or button labels. Do not include shortcut characters and “...” suffixes. The tokens must be added to the
gsm_security_structuretable to become active. Thegsm_security_structuretable enables restricting a token for a specific object instance, specific object, specific product module, or generically for everything.The framework only checks security if a valid, enabled token exists for the button label or tab folder page.
Once a user is allocated tokens, security restrictions are applied. If a folder page or button has access restrictions set up, only users who have been granted access can use it. However, if security control is set to full access by default and a user has no tokens allocated, then that user is assumed to have full access.
Example tokens would be add, delete, modify, view, copy, page 1, and page 2.
|
Copyright © 2005 Progress Software Corporation www.progress.com Voice: (781) 280-4000 Fax: (781) 280-4095 |