U

Quintessential School Systems
U ser Maintenance
and Security:
How to Use Maintain
User Data (MEN020)
Copyright © 2000 by Quintessential School Systems
2 0 E 20 t h Av e n ue , S a n M a t e o C A 9 44 0 3 - - - Vo ic e 6 5 0/ 3 7 2 -0 2 0 0 - - - F ax 6 5 0 / 3 72 - 3 38 6 - - - ww w. q s s . c o m
Published: July, 2000
Copyright Notice
Copyright © 2000
Quintessential School Systems
This document contains proprietary information which is protected by copyright. All
rights are reserved. No part of this document may be photocopied, reproduced, or
translated to another language without the prior written consent of Quintessential
School Systems.
The information contained in this document is subject to change without notice.
QUINTESSENTIAL SCHOOL SYSTEMS MAKES NO WARRANTY OF ANY
KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. Quintessential School Systems shall not be liable for errors contained herein or use of this material.
Table of Contents
Purpose. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
User Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Overview of Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Security Settings and Security Matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Global, District, and User Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Combining the Three Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Include Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Option Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Add, Change, or Inspect a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Select a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Maintain User Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Maintain Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Delete a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Change Global Security File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Security File Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Select File to Maintain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Maintain the File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Copy a User File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Purpose
User Profile
Purpose
Maintain User Data (MEN020) allows you to define the following for authorized
users of QSS/OASIS software:
♦ User Profile
♦ Security Settings
User Profile
Every logon ID that allows a user to run the QSS/OASIS must be defined in two
places:
♦ An MPE user and account name that allows logging onto the HP e3000.
♦ As a user profile for the Menu System defined with Maintain User Data
(MEN020).
The user profile for QSS/OASIS includes the following information:
♦
♦
♦
♦
♦
♦
♦
♦
Password for report job streams
First Menu System screen that displays when the user logs on
Whether to allow access to QSS/OASIS programs
Whether the user is a standard or super user
Printer device for reports
District and site for the logon ID
Fiscal year for the logon ID
User-level JCWs for controlling program options
Security Settings
There are three levels of security settings:
♦ Global default security for all districts
♦ Default security for each district
♦ User-level security settings
Each level of security settings is contained in a separate file that can contain up to 960
lines. Each line contains a security matrix that controls options for a particular program. For example, the security matrix for the TC Screen controls whether a user can
add new accounts while filling in time card data.
Each security matrix has two parts:
07/2000
Copyright © QSS, 2000
1
User Maintenance and Security
How to Use Maintain User Data (MEN020)
♦ The program name identifies the program to which the matrix applies. For example, PP0010I0 is the name for an option that allows you to specify which screens a
user can maintain with Update Per/Pay Master Files (PP0010).
♦ The parameters is a list up to 60 characters long. It is different for each security
matrix. For PP0010I0, the parameters are a list of screen codes for master file. For
other matrices, the parameters are a list of flags for various levels of access. Each
security matrix has its own list of parameters.
Each user’s access permissions are based upon combining all three levels of files.
User security matrices take precedence over district and global matrices, and district
matrices take precedence over global. If the security matrix for a program is not
defined at any level, the defaults for the program apply. When a user logs on, the
Menu System builds a temporary file for each session that contains a composite of
security matrices from all three levels.
You can use include files to simplify maintenance of security matrices. An include
file is a file that contains a series of security matrices. With a special one-line command, you can incorporate the entire contents of one or more include files into any of
the three levels of security settings.
2
Copyright © QSS, 2000
07/2000
Overview of Security Settings
Security Settings and Security Matrices
Overview of Security Settings
This overview looks at the following aspects of security settings:
♦
♦
♦
♦
Security Settings and Security Matrices
Global, District, and User Security Settings
Combining the Three Levels
Include Files
Security Settings and Security Matrices
Security settings allow you to define a set of user options for each logon ID. Security
settings are defined in security files that can contain up to 960 lines. Each line contains a security matrix that allows you to define options for how a particular program
works. There are two parts to each security matrix: a program name and a list of
parameters.
♦ Program Name. Each user option has a program name that is usually 6 or 8 characters long. For example, PP02TC is the program name for the security matrix that
controls the options for the TC Screen of Employee Maintenance (PP0002). Similarly, PP0010X0 is the program name for the security matrix that allows you to
block a user’s access to specified master files when using Update Per/Pay Master
Files (PP0010).
♦ Parameters. Each security matrix has up to 60 characters of parameters. For
example, the parameters for the program name PP02TC control a variety of
options for updating retirement base pay and adding accounts while a payroll clerk
is doing time card entry. But the parameters for the program name PP0010X0 are a
list of 2-character codes for master files that a user is blocked from maintaining
with Update Per/Pay Master Files (PP0010).
A security settings file can contain security matrices for many different programs.
Security matrices are used in many parts of the QSS/OASIS Financial System, such
as Payroll, Stores, Budgeting, General Leader, Budget Development, and Accounts
Payable. The security settings for all modules of the Financial System are contained
in the same security file.
Global, District, and User Security Settings
Maintain User Data (MEN020) allows you to define three levels of security matrices:
global, district, and user.
♦ Global: There is one global security file which contains the default security matrices for all users.
07/2000
Copyright © QSS, 2000
3
User Maintenance and Security
How to Use Maintain User Data (MEN020)
♦ District: There is one district security file for each district. This file contains the
default security matrices for a district. These defaults apply to all users who log
into the district. If the security matrix for a program is in both the district and global files, the district-level security matrix prevails.
♦ User: Each logon ID can have a user-level security file that has the same name as
the user ID. If you create a user-level security file, any security matrices in that file
take precedence over those in the global and district files.
You can use the user file to create exceptions for individual users. For example, the
district defaults contains security matrices for fifty different programs. A supervisory employee needs exceptions to the access permissions in four of those programs. You can create a user-level security file for that supervisor with entries for
just those four programs. The district-level defaults continue to apply for the other
46 programs.
All three levels of security settings are optional. Each program has a set of default
options that apply if there is no security matrix. If you are satisfied with the defaults
for a program, there is no need to define its security matrix.
You can copy security profiles. The X (copy user) option allows you to copy settings
from one user to another. Thus, for example, you can set up the user profile and security settings for one accounting clerk, then copy those settings to other user IDs that
have identical or very similar user profiles. After completing the copy, you can make
any needed adjustments.
Combining the Three Levels
The security settings for each logon ID are a combination of all three levels. When a
user logs into the QSS/OASIS software, the Menu System reads the global, district,
and user security settings, then combines all three into a temporary file that contains
composite security settings. This composite file lasts only as long as each session. It is
created every time a user logs on, and it is purged when the user logs off.
The following rules describe what happens when the three levels of security settings
are combined:
♦ User takes precedence over district and global.
If a user-level security file contains a security matrix, that security matrix governs
for the user. For example, the logon ID FRANCIS.QSSUSER has a user-level
security file that includes a security matrix for PP02TC. These user-level settings
apply to Francis when he enters time card data on the TC Screen. This user-level
security overrides any global or district-level security matrix for PP02TC.
4
Copyright © QSS, 2000
07/2000
Overview of Security Settings
Include Files
♦ District takes precedence over global.
If the same security matrix is in both the district and global security file, the district
security matrix prevails. For example, the logon ID GEORGE.QSSUSER in District 71 does not have a user-level setting for the PP02TC security matrix. However, that security matrix is part of both the global security file and the file for
District 71. In this case, the security matrix PP02TC in the district security controls
George’s options.
♦ Global applies only when district and user are not defined.
The global security settings define the defaults for all users. But these defaults
apply only when they are not overridden with user or district security. For example, the logon ID MARY.QSSUSER is associated with District 58. There is no
security matrix for PP02TC in Mary’s user-level security settings, nor is there any
such matrix in the global settings for District 58. But there is a PP02TC security
matrix in the global security file. In this case, the global security file’s options for
PP02TC apply to Mary.
♦ If you do not define any security matrices, the defaults prevail.
If you do not define a security matrix, the default settings for a program prevail.
For example, the logon BOB.QSSUSER belongs to a county where the PP02TC
security matrix is not defined for at any level: global, district, or user. Thus, the TC
screen functions according to its default capabilities, which means that Bob cannot
update retirement base pay or add accounts while entering time card data.
Include Files
An include file is a security file that you can incorporate by reference. You can define
a set of security settings, then save it in a file. You can incorporate a saved file in any
global, district, or user security file with a $INCLUDE line.
For example, there are about a dozen standard security matrices for payroll clerks.
You can put those security matrices in a separate security file, then save it with a
name like PAYCLERK. To apply those settings to a particular user, all you need do is
type $INCLUDE as the program name, the file name PAYCLERK as the parameter.
This $INCLUDE line causes all of the security matrices in the PAYCLERK file to be
applied to the user.
Include files can simplify change management. Any changes that you make in an
include file are reflected everywhere the include file is used. For example, you need
to change one security matrix and add a new one to the PAYCLERK file. These
changes apply to every user whose security settings have a $INCLUDE line with the
PAYCLERK file.
07/2000
Copyright © QSS, 2000
5
User Maintenance and Security
How to Use Maintain User Data (MEN020)
However, you cannot make a $INCLUDE command part of an include file. A global,
district, or user security file can call an include file. But an include file cannot call
another include file.
Changes to an include file have no effect on users who are already logged on at the
time you make the changes. However, the new or changed security matrices apply to
everyone who logs on after you save the changes to the include files.
6
Copyright © QSS, 2000
07/2000
Option Screen
Option Screen
Figure 1 illustrates the Option Screen for Maintain User Data (MEN020). The list of
options displays after you type H in the Option field and press <ENTER>. This
screen allows you to select an option for maintaining the security profile associated
with a logon ID.
Figure 1: Option Screen for Maintain User Data (MEN020)
Option (R)
Type a code from the following list.
OPTION
SEE PAGE
A - Add a user
9
C - Change a user
9
D - Delete a user
19
I - Inspect a user
9
G - Change global security file
20
S - Security file maintenance
23
X - Copy a user file
28
E - Exit program
n/a
NOTE: The X option allows you to create new user profiles
based on an existing one.
<ENTER>
07/2000
Press <ENTER> to execute the Option.
Copyright © QSS, 2000
7
User Maintenance and Security
8
How to Use Maintain User Data (MEN020)
<Start Over>
Press <Start Over> to type the Option again.
<Return to Menu>
Press <Return to Menu> to stop maintaining users and return
to the Menu System.
Copyright © QSS, 2000
07/2000
Add, Change, or Inspect a User
Select a User
Add, Change, or Inspect a User
These instructions tell how to use the add, change, and inspect options of Maintain
User Data (MEN020). These instructions are combined because the options are so
similar.
These instructions focus on three areas:
♦ Select a User
♦ Maintain User Profile
♦ Maintain Security Settings
Select a User
Figure 2 illustrates the first screen for adding, changing, or inspecting a user’s security profile and security settings. This screen allows you to create a new user profile
or to modify or inspect an existing one.
Figure 2: Select a user to add, change, or inspect
User.acct (R)
Type the MPE logon ID for which you want to create or
maintain a Menu System security profile or security matrix.
♦ To add, type a logon ID for which you have not yet
defined a Menu System profile.
♦ To change or inspect, type a logon ID for which there is
an existing Menu System profile.
There are two parts to each logon ID: user and account.
07/2000
Copyright © QSS, 2000
9
User Maintenance and Security
How to Use Maintain User Data (MEN020)
♦ User. The first part is an 8-character user name.
For the add option, type a user name for which you
have not defined a user profile.
For the change or inspect option, type a user name
for which a user profile already exists.
♦ Account. This field is filled in with QSSUSER, which
is the typical account for logging into the QSS/OASIS
Financial System. You can type another account name
if needed.
10
<ENTER>
Press <ENTER> to continue filling in the screen.
<Start Over>
Press <Start Over> to retype the User.acct.
<Return to Menu>
Press <Return to Menu> to return to the Menu System.
Copyright © QSS, 2000
07/2000
Add, Change, or Inspect a User
Maintain User Profile
Maintain User Profile
Figure 3 illustrates the screen for adding, changing, or inspecting a user profile. This
profile defines important information, such as the audit ID, fiscal year, site, and district number for each authorized Menu System user.
NOTE: For the inspect option, this entire screen is display-only.
Figure 3: Add, change, or inspect a user profile
User.acct (D)
The user and account selected on the previous screen.
User password (O)
Type the password to be inserted in the job streams that this
user ID launches.
This password must match the user password that the user
types in when logging on to the HP e3000. If this password is wrong, this user’s report and batch update jobs
will not be able to log on.
NOTE: This password may not be needed if you are using
job management software that allows you to launch jobs
without embedding passwords in the stream files or if the job
security level on your HP e3000 has been adjusted so that
these passwords are not required. For example, some sites
use VESOFT’s products to eliminate the need to embed
passwords in job streams.
07/2000
Copyright © QSS, 2000
11
User Maintenance and Security
System (R)
How to Use Maintain User Data (MEN020)
Type a system name in this field.
This field is no longer used by the standard QSS software.
You can simply type SYSTEM here. If you prefer something more descriptive of the type of software being used,
you can type something like STUDENT or FINANCE. You
must type something in this field to update the screen.
User id/name (O)
This free-form field allows you to type up to 30 characters.
You can use this field for noting the name or job title of the
person assigned to the logon ID or other such information.
User audit id (R)
Type a 4-character code for keeping track of who changed
records in the database.
Some programs keep track of when information was
changed. They record the User audit id for the user who
changed the information, along with the time and date. If
you want to keep an accurate audit trail, each logon ID
should have a unique User audit id.
First screen (O)
Type the name of the first Menu System screen that displays
when this user logs on.
NOTE: If you leave this field blank, the user has access to
the MPE operating system prompt, which is essentially the
same thing as making this logon ID a super user. Access to
the MPE prompt should be reserved only for members of the
data processing staff.
Allow access (R)
Type Y or N for yes.
♦ Type Y to allow the user to sign onto Menu System and
gain access to the QSS/OASIS programs.
♦ Type N to block the user from using the Menu System
to run QSS/OASIS programs. When the user logs on to
the HP e3000, the session will be logged off, and the
screen displays the following message: Access is
not allowed at the present time.
12
Copyright © QSS, 2000
07/2000
Add, Change, or Inspect a User
Level (O)
Maintain User Profile
Leave blank, or type SU for a super user.
♦ Leave blank for almost all users. Standard users can
select QSS/OASIS and STUDENT/3000 programs
from the Menu System. The Menu System runs automatically when they log on to the HP e3000, and they
are logged off when they exit the Menu System.
♦ Type SU to make this user a super user. Very few people
should be super users. Super users have special capabilities. They can issue commands that are not available
to standard users.They can also gain direct access to the
MPE command prompt. Normally, the only people with
this capability are system administrators and support
specialists.
Local printer (R)
Type a number from the following list.
This number sets the value for the job control word (JCW)
called PRINTX, which controls the printer for reports that
the user ID launches.
PRINTX
0
MEANING
The file equation in the stream file specifies the
device. The line in the stream file looks like this:
FILE PRINTER;DEV=[printer device]
If the stream file does not contain a file equation
for the printer device, the report may not print, or
else it may print at an unexpected place.
07/2000
1
Reports print on the system line printer (device
LP).
3
Reports are routed through LSPOOL. You can
view the reports on your screen, then select the
printer to which to route the reports. This is the
most common setting. It is recommended for
most logon IDs.
70 - 89
Reports are printed on a remote spooled device
called RPxx, where ‘xx’ is the PRINTX value.
For example, setting the PRINTX to 76 sends
reports to device RP76.
90 - 99
Reports are printed on a remote spooled device
with the class name RLPx, where ‘x’ is the ones
digit of the PRINTX. For example, setting the
PRINTX to 93 sends reports to device RLP3.
Copyright © QSS, 2000
13
User Maintenance and Security
District (R)
How to Use Maintain User Data (MEN020)
Type the district number associated with the logon ID.
Almost all records in the financial and student databases
are keyed by district. The District that you type in this
field tells the software what district to look in when this
user requests financial or student data.
Site (R)
Type the 4-digit site number associated with the logon ID or
0000 when none is necessary.
This field is particularly important for logon IDs that will
be accessing STUDENT/3000, remote purchase requisitions, or the stores warehouse/inventory software. Please
refer to the documentation for each of these systems for
the appropriate use of this field.
Fiscal year (R)
Type the last 2 digits of the fiscal year, such as 01 for fiscal
year 2000-2001.
Almost all records are keyed by year. The Fiscal year that
you type in this field tells the software the proper fiscal
year for financial records or the school year for student
data.
NOTE: At the start of each fiscal or school year, update the
Fiscal year field so that users are able to maintain data for
the current year.
User jcw values (R)
Fields 1. through 10. allow you to define USERJCW1
through USERJCW0.
These JCWs are used for setting up options for some programs. For example, they can be used to control access to
screens in Employee Maintenance (PP0002).
<ENTER>
Press <ENTER> to verify the information on the screen.
If the screen is unable to process a field, that field is highlighted, and the Message Line explains why the field is
highlighted. Make any needed changes, then press
<ENTER> again.
<Start Over>
14
Press <Start Over> to return to the Option Screen without
updating the screen.
Copyright © QSS, 2000
07/2000
Add, Change, or Inspect a User
Maintain Security Settings
<Print Screen>
Press <Print Screen> to print a copy of this screen on the
printer assigned to your logon ID.
<Start Over>
Press <Start Over> to return to the Option Screen without
updating the screen.
<Security Settings>
Press <Security Settings> to maintain the user-level security
settings for the current user.
Any security matrices that you define on this screen override district and global security matrices. See
<Update Data>
Press <Update Data> to save the changes to the user profile.
After the update completes, the Option Screen displays
again.
<Return to Menu>
Press <Return to Menu> to cancel any additions or changes
and return to the Menu System.
Maintain Security Settings
Figure 4 illustrates the screen for maintaining the security settings for a user. This
screen displays after you press the <Security Settings> key. The security matrices on
this screen override the global and district default security files. See page 3 for an
explanation of how the global, district, and user security settings are related.
This screen allows you to add, change, or delete individual lines in the security settings file.
To add a security matrix:
♦ Locate a screen where there is an empty line. You may need to press <Page Forward> several times.
♦ Type the Program and its parameters.
♦ Press <ENTER> to process the changes on the screen. After you are through with
all changes to the security settings file, press <Update Data> to update the security
settings file.
To change a security matrix:
♦ Locate the line you want to change. You may need to press <Page Forward> or
<Page Backward> to find the line.
♦ Make any changes to the line.
♦ Press <ENTER> to process the changes on the screen. After you are through with
all changes to the security settings file, press <Update Data> to update the security
settings file.
07/2000
Copyright © QSS, 2000
15
User Maintenance and Security
How to Use Maintain User Data (MEN020)
To delete a security matrix:
♦ Locate the line you want to change. You may need to press <Page Forward> or
<Page Backward> to find the line.
♦ Use the space bar or <Delete> key to erase the Program name.
♦ Press <ENTER> to process the changes on the screen. After you are through with
all changes to the security settings file, press <Update Data> to update the security
settings file.
After you update the security settings, the changes take effect the next time a user
who is subject to these security settings logs in. The changes have no effect on users
who are already logged in at the time you maintain the security file.
NOTE: For the inspect option, this entire screen is display-only.
Figure 4: Maintain security settings for a user
Program (O)
[parameters] (O)
To implement a security matrix, type the Program name and
parameters.
DEFINING SECURITY MATRICES. Each security
matrix has two parts: a program name and a parameter list.
♦ Program. Type a Program name, which is usually 6 or
8 characters long.
♦ Parameters. Type up to 60 characters of parameters.
See the technical notes for the Program name for
instructions on filling in the parameters. Each security
matrix has its own list of parameters.
16
Copyright © QSS, 2000
07/2000
Add, Change, or Inspect a User
Maintain Security Settings
INCLUDE FILES. You use an include file to incorporate
the contents of another file into any global, district, or
user-level security matrix. See page 23 for instruction on
creating an include file.
To incorporate an include file:
♦ Type the word $INCLUDE or $INC in the Program
field.
♦ Type the name of the include file in the first 8 characters of the [parameters].
COMMENT LINES: Any line where the Program name
is $COMMENT or $COM is treated as a comment line. You
can use the [parameters] columns to write notes or explanations to make the security file easier to read or maintain.
The Menu System ignores comment lines when building
the combined security matrix for a user.
NOTE: The screen does not prevent you from typing the
same security matrix twice. If there are duplicate security
matrices for the same Program name, the second matrix
prevails. For example, a security settings file includes a
security matrix for TCPYMT in lines 12 and 48. The parameters for line 48 take precedence.
<ENTER>
Press <ENTER> to process the changes on the screen.
To include the changes on the current screen in the
updated file, press <ENTER> before pressing either <Page
Backward> or <Page Forward>.
<Start Over>
Press <Start Over> to return to the Option Screen without
updating the user-level security matrix.
<Print Screen>
Press <Print Screen> to print a copy of the screen on the
printer assigned to your logon ID.
<User Data>
Press <User Data> to return to maintaining the user profile as
described on page 11.
<Load Global>
Press <Load Global> to copy the global security file into the
user’s security file.
The load process overwrites any existing security matrices
that you have defined for the user.
07/2000
Copyright © QSS, 2000
17
User Maintenance and Security
<Page Backward>
<Page Forward>
How to Use Maintain User Data (MEN020)
Press <Page Forward> and <Page Backward> to see the next
or previous 16 lines of the security file.
Each security file has up to 960 lines, or 60 screen pages.
<Update Data>
Press <Update Data> to save the changes to the user’s security settings.
After the update completes, the program displays the
Option Screen. See page 7 for instructions.
<Return to Menu>
18
Press <Return to Menu> to cancel the changes to the security
file and return to the Menu System.
Copyright © QSS, 2000
07/2000
Delete a User
Maintain Security Settings
Delete a User
Figure 5 illustrates the screen for deleting a logon ID from the Menu System. This
action removes a logon ID from the list of authorized users of the QSS/OASIS Menu
System. However, this screen does not delete the MPE logon ID. To delete a logon ID
from the HP e3000’s list of authorized users, use the MPE command PURGEUSER.
Figure 5: Delete a Menu System User
Option (D)
The delete option chosen on the previous screen.
User.acct (R)
Type the user ID to delete from the Menu System user list.
<ENTER>
Press <ENTER> to delete the user.
After the deletion, the screen clears and prompts for
another option.
NOTE: When you press the <ENTER> key, the user ID is
deleted from the Menu System database. Be certain that you
have typed the user ID that you want to delete, as the screen
does not ask for any confirmation, nor is there any undelete
or undo key.
07/2000
<Start Over>
Before pressing <ENTER>, press <Start Over> to cancel the
deletion and return to the Option Screen.
<Return to Menu>
Before pressing <ENTER>, press <Return to Menu> to cancel the deletion and return to the Menu System.
Copyright © QSS, 2000
19
User Maintenance and Security
How to Use Maintain User Data (MEN020)
Change Global Security File
Figure 6 illustrates the screen that allows you to change the global security file. This
screen allows you to define the default security matrices for the all users in all districts. It contains the defaults for all modules of the QSS/OASIS Financial System.
You can override these global defaults with the district default or user-level security
settings.
This screen allows you to add, change, or delete individual lines in the security settings file.
To add a security matrix:
♦ Locate a screen where there is an empty line. You may need to press <Page Forward> several times.
♦ Type the Program and its parameters.
♦ Press <ENTER> to process the changes on the screen. After you are through with
all changes to the security settings file, press <Update Data> to update the security
settings file.
To change a security matrix:
♦ Locate the line you want to change. You may need to press <Page Forward> or
<Page Backward> to find the line.
♦ Make any changes to the line.
♦ Press <ENTER> to process the changes on the screen. After you are through with
all changes to the security settings file, press <Update Data> to update the security
settings file.
To delete a security matrix:
♦ Locate the line you want to change. You may need to press <Page Forward> or
<Page Backward> to find the line.
♦ Use the space bar or <Delete> key to erase the Program name.
♦ Press <ENTER> to process the changes on the screen. After you are through with
all changes to the security settings file, press <Update Data> to update the security
settings file.
After you update the security settings, the changes take effect the next time a user
who is subject to these security settings logs in. The changes have no effect on users
who are already logged in at the time you maintain the security file.
20
Copyright © QSS, 2000
07/2000
Change Global Security File
Maintain Security Settings
Figure 6: Change global security file
Program (O)
[parameters] (O)
To implement a security matrix, type the Program name and
up to 60 characters of parameters.
DEFINING SECURITY MATRICES. Each security
matrix has two parts: a program name and a parameter list.
♦ Program. Type a Program name, which is usually 6 or
8 characters long.
♦ Parameters. Type up to 60 characters of parameters.
See the technical notes for the Program name for
instructions on filling in the parameters. Each security
matrix has its own list of parameters.
INCLUDE FILES. You can use include files to incorporate the contents of another file into any global, district, or
user-level security matrix. See page 23 for instruction on
creating an include file.
To incorporate an include file:
♦ Type the word $INCLUDE or $INC in the Program
field.
♦ Type the name of the include file in the first 8 characters of the [parameters].
07/2000
Copyright © QSS, 2000
21
User Maintenance and Security
How to Use Maintain User Data (MEN020)
COMMENT LINES: Any line where the Program name
is $COMMENT or $COM is treated as a comment line. You
can use the [parameters] columns to write notes or explanations to make the security file easier to read or maintain.
The Menu System ignores comment lines when building
the combined security matrix for a user.
NOTE: The screen does not prevent you from typing the
same security matrix twice. If there are duplicate security
matrices for the same Program name, the second matrix
prevails. For example, a security settings file includes a
security matrix for TCPYMT in lines 12 and 48. The parameters for line 48 take precedence.
<ENTER>
Press <ENTER> to process the changes on the screen.
To include the changes on the current screen in the
updated file, press <ENTER> before pressing either <Page
Backward> or <Page Forward>.
<Start Over>
Press <Start Over> to return to the Option Screen without
updating the user-level security matrix.
<Print Screen>
Press <Print Screen> to print a copy of the screen on the
printer assigned to your logon ID.
<Page Backward>
<Page Forward>
Press <Page Forward> and <Page Backward> to see the next
or previous 16 lines of the security file.
Each security file has up to 960 lines, or 60 screen pages.
<Update Data>
Press <Update Data> to save the changes to the user’s security settings.
After the update completes, the program displays the
Option Screen. See page 7 for instructions.
<Return to Menu>
22
Press <Return to Menu> to cancel the changes to the security
file and return to the Menu System.
Copyright © QSS, 2000
07/2000
Security File Maintenance
Select File to Maintain
Security File Maintenance
The Security File Maintenance screen allows you to maintain any of the four different
types of security files: global, district, user, and include. There are two steps in maintaining this file:
♦ Select File to Maintain
♦ Maintain the File
Select File to Maintain
Figure 7 illustrates the screen that displays after you select the S option. This screen
allows you to select which security file to maintain.
Figure 7: Security File Maintenance (1 of 2)
<Start Over>
Press <Start Over> to return to the Option Screen without
maintaining a file.
<Global>
Press <Global> to maintain the global security file.
This file defines the default security settings for all districts. You can override these settings with a district or
user security file.
See page 25 for instructions.
07/2000
Copyright © QSS, 2000
23
User Maintenance and Security
<District>
How to Use Maintain User Data (MEN020)
Press <District> to maintain the district default file.
This security file defines the default security settings for
all users in a district.
To continue filling in the screen:
♦ Type the District number for which you want to maintain the default security settings.
♦ Press <ENTER> to fill in the screen as described on
page 25.
<User>
Press <User> to maintain security settings for a user. The
security matrices in this file override any district and global
default security settings.
To continue filling in the screen:
♦ Type the 8-character user name to select the logon ID
for which to maintain user-level security settings.
♦ Press <ENTER> to fill in the screen as described on
page 25.
<Include>
Press <Include> to maintain an include file. This file contains
a group of settings that you can include in any global, district,
or user security settings. See page 5 for a discussion of
include files.
To continue filling in the screen:
♦ Type an Include file name up to 8 characters long.
♦ Press <ENTER> to fill in the screen as described on
page 25.
<Return to Menu>
24
Press <Return to Menu> to return to the Menu System.
Copyright © QSS, 2000
07/2000
Security File Maintenance
Maintain the File
Maintain the File
Figure 8 illustrates the screen that allows you to define the selected security file. This
option allows you to maintain all levels of security files: global, district, user, and
include files.
Figure 8: Security File Maintenance (2 of 2)
Program Security
Matrix (D)
The top of the screen identifies kind of security matrix
selected on the previous screen, such as ( User:
Frances ) for the user-level security matrix for
FRANCES.QSSUSER.
In other cases, the top of the screen may identify the district number for district-level security, the name of a
$INCLUDE file, or the global security file.
Program (O)
[parameters] (O)
To implement a security matrix, type the Program name and
up to 60 characters of parameters.
DEFINING SECURITY MATRICES. Each security
matrix has two parts: a program name and a parameter list.
♦ Program. Type a Program name, which is usually 6 or
8 characters long.
♦ Parameters. Type up to 60 characters of parameters.
See the technical notes for the Program name for
instructions on filling in the parameters. Each security
matrix has its own list of parameters.
07/2000
Copyright © QSS, 2000
25
User Maintenance and Security
How to Use Maintain User Data (MEN020)
INCLUDE FILES. You can use include files to incorporate the contents of another file into any global, district, or
user-level security matrix.
To incorporate an include file:
♦ Type the word $INCLUDE or $INC in the Program
field.
♦ Type the name of the include file in the first 8 characters of the [parameters].
COMMENT LINES: Any line where the Program name
is $COMMENT or $COM is treated as a comment line. You
can use the [parameters] columns to write notes or explanations to make the security file easier to read or maintain.
The Menu System ignores comment lines when building
the combined security matrix for a user.
NOTE: The screen does not prevent you from typing the
same security matrix twice. If there are duplicate security
matrices for the same Program name, the second matrix
prevails. For example, a security settings file includes a
security matrix for TCPYMT in lines 12 and 48. The parameters for line 48 take precedence.
<ENTER>
Press <ENTER> to process the changes on the screen.
To include the changes on the current screen in the
updated file, press <ENTER> before pressing either <Page
Backward> or <Page Forward>.
<Start Over>
Press <Start Over> to return to the Option Screen without
updating the user-level security matrix.
<Print Screen>
Press <Print Screen> to print a copy of the screen on the
printer assigned to your logon ID.
<Page Backward>
<Page Forward>
Press <Page Forward> and <Page Backward> to see the next
or previous 16 lines of the security file.
Each security file has up to 960 lines, or 60 screen pages.
26
Copyright © QSS, 2000
07/2000
<Update Data>
Press <Update Data> to save the changes to the user’s security settings.
After the update completes, the program displays the
Option Screen. See page 7 for instructions.
<Return to Menu>
07/2000
Press <Return to Menu> to cancel the changes to the security
file and return to the Menu System.
Copyright © QSS, 2000
27
User Maintenance and Security
How to Use Maintain User Data (MEN020)
Copy a User File
Figure 9 illustrates the screen that displays after you select the X option. This screen
allows you to copy user profiles and security matrices. You can use this screen to create new user profiles based on an existing user.
Figure 9: Copy a User File
Option (R)
The copy option selected from the previous screen.
Copy from User.acct Type the name of the user ID to copy from.
(R)
To make copying a series of users easier, the name that
you type here remains the next time you use the option.
Copy to User.acct (R) Type the name of the user ID to copy to or create.
User definition (R)
Leave the Y as is, or type N for yes.
♦ Leave the Y as is to copy the user profile for the logon
ID. See Figure 3 on page 11 for an illustration of the
information that is copied.
If you answer Y, the copy process creates the user ID in
the Copy to User.acct field if it does not already exist.
♦ Type N to skip copying the user definition.
28
Copyright © QSS, 2000
07/2000
Copy a User File
If you answer N, the user ID to which you are copying
must already exist. The copy process will not create it
for you.
Security settings (R) Leave the Y as is, or type N for yes.
♦ Leave the Y as is to copy the user security settings to
the target user ID.
♦ Type N to skip copying the user-level security settings.
<ENTER>
Press <ENTER> to copy the user ID.
After the copy completes, the screen clears and prompts
for another option. See page 7 for instructions.
07/2000
<Start Over>
Press <Start Over> to return to the Option Screen without
copying any users. See page 7 for instructions.
<Return to Menu>
Press <Return to Menu> to return to the Menu System.
Copyright © QSS, 2000
29
User Maintenance and Security
How to Use Maintain User Data (MEN020)
Index
A
L
allowing access to programs 12
annual maintenance of fiscal year 14
audit ID 12
comment lines 17, 22, 26
levels of security settings
combining 4–5
overview of 3–4
levels of users 13
local printer 13
location 14
logon district 14
logon site (location) 14
logon year 14
LSPOOL, routing reports through 13
D
M
default security 4, 5
disabling access to programs 12
district security
defining 23–27
precedence over global 5
district, logon 14
Maintain User Data (MEN020)
add user option 9–18
change global security file option 20–22
change user option 9–18
copy user option 28–29
delete user option 19
inspect user option 9–18
option screen 7–8
security file maintenance option 23–27
MEN020. See Maintain User Data (MEN020)
MPE logon ID 1, 9–10
B
batch update jobs, password for 11
C
E
Employee Maintenance (PP0002) 14
F
N
first Menu System screen 12
fiscal year 14
name (description) of user ID 12
G
P
global security
application to district and user security 5
defining 20–22, 23–27
parameters
defined 3
district security 25
global security 21, 25
include file 25
user security 16, 25
PRINTX value 13
program name
defined 3
district security 25
global security 21, 25
include files 25
user security 16, 25
I
include files
defining 23–27
district security 17
global security 17, 21
overview of 5–6
user security 17
initial Menu System screen 12
30
Copyright © QSS, 200007/2000
07/1000
Index
R
U
report jobs, password for 11
user profile
allowing access to programs 12
audit ID 12
deleting 19
disabling access to programs 12
district 14
first screen 12
fiscal year 14
levels of users
standard 13
super user 13
local printer (PRINTX value) 13
MPE logon ID 9–10
name (description) 12
password 11
routing reports through LSPOOL 13
site (location) 14
system 12
user and account 9–10
USERJCW1 through USERJCW0 14
user security
defining 15–18, 23–27
precedence over district and global 4
USERJCW1 through USERJCW0 14
S
security matrices
defining 15–18, 20–22, 23–27
and security settings 3
security settings
combining levels of 4–5
default 4
deleting 19
levels of 3–4
and security matrices 3
user security 15–18
site 14
standard users 13
super users 13
system 12
07/2000
Copyright © QSS, 2000
31