Download presentation
Presentation is loading. Please wait.
Published byRosemary Cooper Modified over 8 years ago
1
1 View Record and Field-Level Security
2
2 View – Database Environment Conceals sensitive field data from unauthorized users, with no modifications to existing applications Conceals entire records based upon numerous in-data conditions Allows administrators to restrict fields/records to selected users Quick, easy modification of user and user-group profiles Defining file and field restrictions is a snap
3
3 View – Main Screen
4
4 Application Data Entry Screens As Seen by Authorized Users As Seen by Restricted Users
5
5 Sample View Application (1/2)
6
6 Sample View Application (2/2) Sensitive data in the “Contact person” and “Credit” fields are hidden…
7
7 View GUI – Field Security
8
8 View GUI – Record Security
9
9 Please visit us at www.razlee.com Thank You!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.