> > > > >
The Security Attribute document is used to activate and deactivate accounting line attributes for use in configuring security. The table below lists all attributes on which security may be based.
The attributes that may be used to configure security are hard coded. New attributes cannot be added by individual institutions without modifying code.
Account line attributes available for use in configuring security
Attributes that may be activated |
Result of activation |
Account |
The account number entered into the accounting line is compared to the user’s access security value in the applicable security model. Note that Chart is not considered in the evaluation of this form of security access. |
Chart |
The chart specified on the accounting line is compared to the user’s access security value in the applicable security model. |
Chart-Descend Hierarchy |
The user’s access security is compared to the chart codes that report up to the chart code that has the security access restrictions. |
Object Consolidation |
The access security restriction is derived from the object consolidation code associated with the object level code of the object code entered into the accounting line. |
Object Level |
The access security restriction is derived from the object level code associated with the object code entered into the accounting line. |
Organization |
The organization specified on the accounting line is compared to the user’s access security value in the applicable security model. |
Organization-Descend Hierarchy |
The user’s access security is compared to the organization codes that report up to the organization code that has the security access restrictions. |
|
The access security restriction is derived from the project directors and their associated accounts with an award. Currently, the application requires users to enter the accounts as the security value. The project directors who are permitted to access the accounts are derived from the awards. |
Project Code |
The project code specified on the accounting line is compared to the user’s access security value in the applicable security model. |
Sub Account |
The sub-account specified on the accounting line is compared to the user’s access security value in the applicable security model. |
When the user chooses the Attribute option, the system displays the Security Attribute Lookup screen. After the user searches for and selects an attribute to edit, the system displays the Security Attribute document.
More: