What's the best way... -Reply

Richard Witkopp witkopp@idt.com
Thu, 18 Mar 1999 16:06:24 -0800


> We do something similar with a separate set of security 
> tables to check users against allowable functions rather than 
> using the inbuilt PH security options.

Yes, I've had to do the same. ASC security was perfectly adequate,
but there's no way to maintain the ASC's without dictionary
access, which we were not willing to give to the users in any
form. So we had to replicate ASC security with screens that the
power users could manage. Another little concept Cognos needs to
catch up on - that users have a need to manage their own apps.
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Subscribe: "subscribe powerh-l" in message body to majordomo@lists.swau.edu
Unsubscribe: "unsubscribe powerh-l" in message to majordomo@lists.swau.edu
powerh-l@lists.swau.edu is gatewayed one-way to bit.listserv.powerh-l
This list is closed, thus to post to the list, you must be a subscriber.