Security Matrix and the Shadow Applications
Before you can view any data in the shadow application you need to consider the impact of the security matrix feature.
Though you have not applied the security matrix to this application, there is a security matrix in effect in the parent application.
This matrix will control visibility through the shadow application.
- Use the parent Security Matrix if the Security Matrix has not been enabled in the Shadow Application
- Use the parent Application Scope Access if Application Scope Access has not been enabled in the Shadow Application.
If the Security Matrix or Application Scope Access have been enabled in the Shadow UTA they will override those of the parent UTA.
Enabling a Shadow Application Security Matrix
In this exercise, you will activate the security matrix for the shadow application and thus override the matrix from the parent application.
1. Choose the Applications, Contracts – Customer View menu.
2. Click the Contracts tab.
3. Select both status check boxes.
4. Click the Find button.
No Items are displayed with the security matrix in place.
Next you will create a matrix within this application.
5. Click Settings, and then on the Security tab.
6. Click the Enable Security Matrix check box.
7. Click any Save button.
8. Click the Security Matrix link.
The matrix is only available for Level 1 items as you did not include Level 2 or 3 in the shadow application.
9. Set the View Permission for All.
10. Click the Save button.
11. Click Contracts tab.
The contracts are displayed.
As you have not set any list view there is no way to drill down to an individual contract.
Setting the List View in a Shadow Application
Setting the list view is exactly the same for all Universal Tracking applications.
1. Click the Settings tab.
2. Click the List View link.
Only the fields selected in this application are displayed.
3. Set the fields as shown below:
4. Click the Save button.
5. Click the Contracts tab.
The contracts are now displayed correctly.
Note the type and the status displayed are from the shadow application – not the parent application.
6. Click on the first contract to review the details.
- Only the selected standard fields are displayed.
- The custom fields are displayed. We indicated that custom fields should be inherited by the shadow application.
- The contract cannot be edited as the security matrix is providing a read-only view.
- Benefits of a Shadow Application
- Creating and Enabling a Shadow Application
- Setting Manager Permission to the Shadow Application
- Configuring Templates and Statuses in a Shadow Application