Security

John Pearce jpearce@rmi.net
Mon, 17 Jan 2000 21:37:21 -0700


Dave Know wrote:
>There's many different ways to approach this. So to add another...
>
>You may also wish to consider SETSYSTEMVAL/GETSYSTEMVAL options.
>

Thanks for the suggestion, Dave.  You're right about the decreased overhead
of using a system variable.  I'll take a look at that.

As for the ASC's, they are currently used to determine who can do what as
far as screens, reports, and processes.  My tendency at the moment is to
keep the data access security outside the ASC's.  If there's a good reason
to use the ASC's for access controls, I'd like to learn about it.

Thanks,

John

------------------------------------------------------------------
John Pearce  <jpearce@rmi.net>       | Bethesda Management Company 
Speaking for only myself             | Colorado Springs, CO  USA
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Subscribe: "subscribe powerh-l" in message body to majordomo@lists.swau.edu
Unsubscribe: "unsubscribe powerh-l" in message to majordomo@lists.swau.edu
This list is closed, thus to post to the list, you must be a subscriber.