https://store-images.s-microsoft.com/image/apps.40683.ce83f18a-368c-4e42-bdbc-10269efd683d.b27c73b9-9712-4b08-8e0a-b5b3adbd24c7.eef3c876-2945-4e34-ae13-23a68b188bc2

Fusion5 Security Utility

Fusion5 Limited

Fusion5 Security Utility

Fusion5 Limited

Form button and data entity security made easy

The purpose of the Fusion5 (F5) Security Utility is to assist users with identifying security associated to form buttons and data entities (for data management and OData).

For instance, when you are troubleshooting a user security issue of missing access to a specific button on a form, you can use this tool to easily identify which security objects have access to the button, and take further actions to fix the issue.

Another example would be, for integration purposes, you may want to find out security objects with access to a specific data entity, with this tool you can achieve it just by one click.

Key Features

· Form buttons security

· Data entity security – Data management

· Data entity security – Odata

Key Benefits

· Display and maintain roles, duties and privileges

· Display data entity security access points

· Maintain form button security

Form Buttons Security

· The Form buttons security is enabled on most forms

· The Form buttons security displays all security access points (role, duty, privileges) required to view and click the button

· If no security is displayed, this means no existing security is configured

· The Forms button security dialog will allow:

· roles to be added to users

· duties to be added to standard and custom roles

· privileges to standard duties only (Limitation of standard functionality, it won’t allow for a privilege to a custom duty)

Data Entity Security – Data Management/Odata

· The Data entity security will display the security access points for the selected entities (role, duty, privileges)

· If no security access points are displayed, this means no existing security has been configured for the data entity

· The Data entity security dialog will display the security. The security configuration tool must be used to add and identify security to roles, duties and users

https://store-images.s-microsoft.com/image/apps.39381.ce83f18a-368c-4e42-bdbc-10269efd683d.b27c73b9-9712-4b08-8e0a-b5b3adbd24c7.6c48b55a-f172-40c8-ac7d-73037a5ee31e
https://store-images.s-microsoft.com/image/apps.39381.ce83f18a-368c-4e42-bdbc-10269efd683d.b27c73b9-9712-4b08-8e0a-b5b3adbd24c7.6c48b55a-f172-40c8-ac7d-73037a5ee31e
https://store-images.s-microsoft.com/image/apps.54346.ce83f18a-368c-4e42-bdbc-10269efd683d.b27c73b9-9712-4b08-8e0a-b5b3adbd24c7.b3018df7-074b-43fd-b15b-550481f2672d
https://store-images.s-microsoft.com/image/apps.40711.ce83f18a-368c-4e42-bdbc-10269efd683d.b27c73b9-9712-4b08-8e0a-b5b3adbd24c7.ce53e579-dae6-4b92-ab86-0225b6ef9364