Getting Started #
TAD has five security aspects and all but one are driven by the Vista access of the user.
- Table Security is driven by Vista Form security
- Report Security is driven by Vista Report security
- Attachment Security is driven by Vista Attachment security
- Data Security is driven by Vista Data security
- Ribbon Button Security is driven by the TAD Licenses form
Table Security #
Table Security allows you to control the following for each Table.
- Allow Download
- Allow Import
- Allow Update
- Allow Delete
Every TAD Table is linked to a Vista Form. If the user has access to the form in Vista they will have access to the linked Table in TAD.
Most TAD Tables have a corresponding Vista form which we will call Primary Matches. The others, such as the posted transaction tables like JCCD (JC Cost Detail), do not have an exact match, which we will call Secondary Matches.
When reviewing VA Form Security in Vista, the following is true about how security is generated.
Primary Matches
- If Access is 0-Full the user will have Allow Download checked
- If Add is checked the user will have Allow Import checked
- If Update is checked the user will have Allow Update checked
- If Delete is checked the user will have Allow Delete checked
Secondary Matches
- If Access is 0-Full the user will have Allow Download checked
- The Add/Update/Delete check boxes do not check the Allow Import, Allow Update and Allow Delete check boxes
The image below shows multiple tables linked to the JCCOSTADJ (JC Cost Adjustments) Vista Form.
The bJCCB table is the Primary Match for JC Cost Adjustments so all Allow check boxes are checked.
The bJCCD table is the Secondary Match for JC Cost Adjustments so only the Allow Download is checked.
You’ll notice the first row has all check boxes checked including the Override box. That means someone overrode the default security that is generated.
Report Security #
Report Security allows you to control the following for each Report.
- Allow Download
Every TAD Report is linked to a Vista Report. If the user has access to the report in Vista they will have access to the linked report in TAD.
Most TAD reports were created to replicate the same data as existing Vista reports those were an easy match. For the reports originating from TAD, a Vista report that produces the same data was chosen.
In the example below, the todd.sql account doesn’t have access to AP reports so Allow Download generated as No. The Override box could be checked to give that user access.
Attachment Security #
When a user opens the TAD Attachment List form it will always show the attachment record(s) like the screenshot below. If the Access column shows a Y then the user will be able to Open/Save the attachment. Otherwise, the user is not able to do either option.
Data Security #
While TAD and the user guide refer to Tables, users are actually working with Views. Views are a layer on top of Tables in which security can be applied. All secured datatypes in VA Data Security Setup are still effective when users are downloading data with TAD.
If you’re using SQL Accounts to access TAD, make sure to assign the appropriate data security groups to the SQL Accounts in VA User Profile in Vista.
Ribbon Button Security #
You control what buttons a user can click on the TAD Ribbon. Simply uncheck any button you don’t want the user to access and they will receive an error message when clicking the button.
If a user has an Excel workbook open then the changes won’t take effect until they close and open again.