The security system supports the entire software application. The specific functions and tasks cannot be accessed by a user unless permission has been granted via the security administration options in the Tasklist.
Security verification is often done twice when using Tasklist:
· When a Tasklist is displayed, security verification is performed on all of its tasks to disable any non-accessible tasks.
· When a function launch is actually attempted, security verification is performed on the particular task. The second verification is redundant when using Tasklist, but it is necessary to enforce security when the function launch is initiated from outside the Tasklist system.
The security management structure for the software environment involves four distinct types of security: user database-level security, application database-level security, application function-level security, and application tab-level/object-level security.
Within each of these security types, the set of permissions for a specific user is uniquely identified by a User ID. Each User ID is mapped to a server Login ID with an associated password that must be provided in order to use the specified server, database, and security scheme.