HS&H Kernel - User Guide


Introduction

The HS&H Kernel System GUI is a help desk product allowing a system administrator to undertake a range of tasks common to many corporate applications. The facilities include:

The external applications supported by the HSH Kernel System use this information at runtime to control access to the corresponding utilities, such as input forms, browsers and reports. A system’s security information is of no use unless the application uses the HSH Kernel’s security routines. To this end, HSH Kernel is included as an .mda file as part of each application’s release.

This document concentrates mainly on the management of the authorised user list and assignment of rights to each system and its utilities.


OperationCorporate User ListAuthorised System UsersSecurity by UserSecurity by Utility


General Operation

The HS&H Kernel System GUI is a help desk product allowing a system administrator to undertake a range of tasks common to many corporate applications. The facilities include:

The external applications supported by the HSH Kernel System use this information at runtime to control access to the corresponding utilities, such as input forms, browsers and reports. A system’s security information is of no use unless the application uses the HSH Kernel’s security routines. To this end, HS&H Kernel is included as an .mda file as part of each application’s release.

This document concentrates mainly on the management of the authorised user list and assignment of rights to each system and its utilities.


OperationCorporate User ListAuthorised System UsersSecurity by UserSecurity by Utility


Corporate User List

The list normally contains the complete collection of authorised application users within a corporation. The input form is shown below. Each user is usually identified by their normal workstation login ID, and the User Name is for completeness. As in NT, each Network Login ID must be unique, but the User Name can be duplicated.

The command buttons perfomr the following functions:

Systems Drills down to the assignment of users to each application in the Authorised System Users form. An alternative approach is to double click on a user record. Any changes made on the current edited row will be saved beforehand, if the input rules permit.
Security Assigns users' access righst to applications and utilities
Excel Exports data as an Excel spreadsheet
Print Produces a hard copy of all current authorised users. You can also obtain a printout by pressing Ctrl+P.
Quit Closes this form. Any changes made on the current edited row will be saved, if the input rules permit.

OperationCorporate User ListAuthorised System UsersSecurity by UserSecurity by Utility


Authorised System Users

The current list of authorised users is shown for the selected system as indicated in the System combo box near the top of the input form shown below. This combo list comprises the complete set of applications (systems) using the HSH Kernel System’s security features.

Selecting a different system refreshes the form with the corresponding user details. There are three elements that may be completed for a user:

The command buttons perform the following operations:

Security Drills down to the assignment of access rights to utilities in the selected system for te current user, in the Security Management by User form. An alternative approach is to double click on a user record. Any changes made on the current edited row will be saved beforehand, if the input rules permit.
Excel Exports data as an Excel spreadsheet
Print Produces a hard copy of all current authorised users. You can also obtain a printout by pressing Ctrl+P.
Quit Closes this form. Any changes made on the current edited row will be saved, if the input rules permit.

If a new user is created from the Corporate User List input form, no system access rights are granted. Each required system must be specified in turn. This is also true all utilities within each application.


OperationCorporate User ListAuthorised System UsersSecurity by UserSecurity by Utility


Security Management by User

An application will comprise at least one screen based utility (or feature) which requires user access control. Although a user can use an application, not all features need to be made available. This form allows selective masking on a user by user basis.

The current user and system selections are shown in the combo boxes at the top of the form. The user list is the same as that maintained in the Corporate User List. The System combo list is derived from an internal table (ztblSystem) which is maintained by the development teams.

All utilities available in the current system are displayed as a list with three check boxes at right. When checked, the appropriate facility Read/Edit/Print is available for the current user. Simply check on and off as necessary. The Edit and Read check boxes are mutually dependent: if Read is off, then Edit is off; if Edit is on, then Read is on.

The same attribute for all utilities can be set by double clicking on any check box in the appropriate column. If a box is checked, then all boxes in that column will become Unchecked, and vice versa.

The current user can adopt the same access profile as an other authorised user by specifying the name in the combo box at the foot of the screen. Once displayed, double click on it to effect an immediate update of the current user.

On occasions, it is useful to take an orthogonal view of the user/utility profiles to view the global access rights for a utility across the user list. This is effected by double clicking on the appropriate utility row, which leads to the Utility Management by User input form. Any changes made on the current edited row will be saved beforehand, if the input rules permit.


OperationCorporate User ListAuthorised System UsersSecurity by UserSecurity by Utility


Security Management by Utility

This form behaves in identical manner to the Security Management by User input form, but shows access rights for each user of a system’s utility.

The same attribute for all users can be set by double clicking on any check box in the appropriate column. If a box is checked, then all boxes in that column will become Unchecked, and vice versa.

The current utility can adopt the same access profile as an other utility for all users by specifying the name in the combo box at the foot of the screen. Once displayed, double click on it to effect an immediate update of the current utility.

A user’s complete access profile can be viewed by double clicking on that user’s row in the form. This will redisplay the Security Management by User input form.


OperationCorporate User ListAuthorised System UsersSecurity by UserSecurity by Utility