1 View Record and Field-Level Security
2 View – Database Environment Conceals sensitive field data from unauthorized users, with no modifications to existing applications Conceals entire records based upon numerous in-data conditions Allows administrators to restrict fields/records to selected users Quick, easy modification of user and user-group profiles Defining file and field restrictions is a snap
3 View – Main Screen
4 Application Data Entry Screens As Seen by Authorized Users As Seen by Restricted Users
5 Sample View Application (1/2)
6 Sample View Application (2/2) Sensitive data in the “Contact person” and “Credit” fields are hidden…
7 View GUI – Field Security
8 View GUI – Record Security
9 Please visit us at Thank You!