Setup
In the Workflow Setup, select how the validation of the change permissions should work.
- Choose the icon, enter Workflow Setup, and then choose the related link.
- Choose the Field Security FastTab.
- In the Field Security Ranking field, select how the application should determine access rights for fields. The options are:
- User = Team = Role – The validation of the assignment of user rights is processed by disjunction. That means that the assigned rights are coequal. If a user role has change permissions, but the user, to whom the role was assigned has not, so the user inherits the change permission on a field by the assigned user role.
- User > Team > Role – Rights on user level are superior then rights are granted by a team or role. That means, that a change permission/prohibition, which a user inherited by an assigned user role, can be revoked/granted explicitly.
Note
The steps below are one option to add fields to the field security monitor. It is also possible to use the Field Security Matrix page to directly set up change permissions for certain fields. For more information, see Field Security Matrix.
In the Field Security Setup page, determine tables and fields which should be protected against modification by certain users. These fields are displayed in the Field Security Matrix page.
Setting up fields that should be monitored
- Choose the icon, enter Field Security Setup, and then choose the related link.
- Choose the New action to create a new line.
- Choose the ellipsis button in the Table No. field to open the available tables on the Object List page.
- Select the desired table and choose the OK button. The name of the table will be displayed in the Table Caption field.
- Choose the desired action in the Field Security Behavior field. The options are:
- <Blank> – The changes to the field in this table will not be monitored.
- Error – Upon leaving the modified record, an error message will be displayed and the change to the respective field(s) will be undone.
- Roll back – The original value of the modified field will be validated with its old value meaning the business logic linked to the field will be executed again.
Setting up the Field Security for certain fields
Select the row for the created table and then choose the Fields action on the action bar. The Field Security Setup Fields page is displayed.
Choose the ellipsis button in the Field No. field to open the available tables on the Fields page.
Select the desired table and choose the OK button. The name of the field will be displayed in Field Caption field.
In the Field Security Type field, choose how the field should behave relative to the field permissions. The options are:
- <Blank> – The selected field will not be monitored.
- Inclusive – A user cannot change the field unless change permissions have been assigned explicitly to the respective user (for example, if there is a Credit Limit on the customer card, the field should only be modified by a small group of users).
- Exclusive – A user can change the field unless change permissions have been revoked explicitly for the respective user.
Select the Skip if Field was empty checkbox to fill in an empty field.
The change permissions for the field will only be active if the field was not empty before it was modified.
- Select a line in the Field Security Setup Fields and choose the Show Permission action on the action bar, in order to see the permissions for the selected field and all active users in the company.
Feedback
Submit feedback for this page .