…not every level (or every pair) will work for everyone.
Want to empower your users with data access? Then you need to control their data access levels.
Why is it important? User empowerment is the practice of sharing information so employees can take initiative to make decisions to solve problems and improve service and performance.
Sharing the information may either make your stomach turn or allow you to take a break and rest peacefully at the beach. But sharing information does not have to put you, your organization, or your data at risk. Users can be granted access to as much (or as little) information as needed.
It all comes down to controlling user access levels. And controlling user access is a lot like choosing a pair of shoes. The shoes that work for me aren’t going to work for everyone else. Nor will the same pair work all of the time. I need a closet of shoes—I need options.
My favorite pair of orange and pink pumps (yes, I really own a pair of shoes those colors!) won’t work when I’m running around the grocery store and definitely aren’t suitable on a snowy Chicago day. I own several pairs of black boots expressly to have options (high heel, low heel, ankle height, knee height) that work in different situations.
That is why Sequel Data Access offers different options of interface as well as many methods to secure the data. Sequel Viewpoint is a Windows interface that allows users to run data retrieval requests or build new ones.
Setting Different Data Access Levels
For novice users, you might want to direct them to a limited number of requests and not allow design capability. It’s simple, practical, and possible—like my trusty and comfortable pair of clogs.
Intermediate users might want design ability but need more structure around building their request through a guided step-by-step interface or a template that has been provided. It gives users a new level of freedom, like a pair of black pumps that work with anything.
Advanced users might be more sophisticated and want full design functionality. They might be ready for the orange and pink pumps!
Each user can have a different “assistance level” applied to their defaults through the Viewpoint Administrator. Maintaining and setting these levels is as easy as trying on a new pair of shoes. Simply click through Viewpoint Administrator and select the level that best fits your users.
Keeping Data Secure at Different Levels
Users can be empowered while keeping your data secure. Not all users need all data. There are several options to give them visibility to only the data appropriate and necessary for their jobs.
1. IBM i Object-Level Authority
If you already utilize object authority on the IBM i, then your shopping is done. Viewpoint will respect the authority restrictions both while designing and running requests.
2. Special Application Authority
JDE shops have the luxury of security built into the application. Viewpoint will observe this security when you create a connection to JDE. In Sequel 11.6 (December 2016), both “environment” and “role” will be prompted in the browser interface.
3. Viewpoint Authority
Viewpoint also offers two options to secure data that can be defined through the Administrator.
The first option is database security. This will limit access to libraries, files, and fields.
The second option is advanced database security. This can be applied to libraries, files, fields, and rows/records. Additionally, the advanced option can be set to work on users with all object authority.
Empower Your Users in Style
Empowering your users with access to key business information can be secure and safe. It is just a matter of finding the right fit and the right style for your users and organizations. Let us help you try it out—even the pink and orange pumps!