Difference between revisions of "BPCS Naming Conventions"
(→BPCS V4.0.5.CD Implied Security) |
(→BPCS V4.0.5.CD Implied Security) |
||
Line 44: | Line 44: | ||
You need some values in the BPCS User Security (explained above) to grant you access to be updating menu options to add programs ... for most sites 99% of the programs added to menus are [[CLP]] programs, but other kinds are supported. | You need some values in the BPCS User Security (explained above) to grant you access to be updating menu options to add programs ... for most sites 99% of the programs added to menus are [[CLP]] programs, but other kinds are supported. | ||
− | Al Mac showed some co-workers how to create [[Query]] definitions | + | Al Mac showed some co-workers how to create [[Query]] definitions; embed them in [[CLP]] programs using [[CLP/400 examples]] such as [[INVENGQRY]] to show them how; compile the result; and put the [[CLP]] program onto BPCS Menus. |
+ | |||
+ | However, some of what Al tried to explain fell out of our collective brains as was discovered when these co-workers tried to show OTHER co-workers how to run their new creations. |
Revision as of 07:45, 26 May 2005
As explained in some CLP/400 examples of CLP/400 programs, software for BPCS needs to be named in such a way that it is going to work within BPCS Security, which has some variations by version.
Contents
BPCS Conventions
For reasons of BPCS being a licensed and copyrighted ERP this is just a synopsis of key FAQ so as to avoid having to repeat ourselves within CLP/400 examples of programs.
BPCS V4.0.5.CD Conventions
BPCS comes with applications in which the first 3 letters of the programs are an abbreviation of the application area, such as
- INV = Inventory;
- ORD = Customer Orders;
- PUR = Purchase Orders;
- SYS = System Stuff.
BPCS Security
For reasons of Security, this is just a synopsis of key FAQ.
BPCS V4.0.5.CD Security
What people can access and run is controlled by several elements:
- their 400 user profile;
- HOW do they access the 400 ... via Green Screen or Client Access?;
- their BPCS user security;
- are they on the list for some menu we added?
BPCS V4.0.5.CD User Security
BPCS User Security controls
- Which BPCS Environments may this person access;
- Is this person an ordinary user or a BPCS Security Officer?
- What can the user access outside of the normal menu structure?
- What applications and sub-application areas is this user authorized to run?
- What Financial Companies is this user allowed to get into?
- What Warehouses can this user get into?
- What Inventory Transactions may this user do?
BPCS V4.0.5.CD Implied Security
There are some realities not spelled out by the BPCS documentation that companies using this ERP from SSA discover in general practice.
You need some values in the 400 user profile to permit a person to create a program and get it complied so that it will run in the BPCS library list, and have any co-worker run it Ok.
You need some values in the BPCS User Security (explained above) to grant you access to be updating menu options to add programs ... for most sites 99% of the programs added to menus are CLP programs, but other kinds are supported.
Al Mac showed some co-workers how to create Query definitions; embed them in CLP programs using CLP/400 examples such as INVENGQRY to show them how; compile the result; and put the CLP program onto BPCS Menus.
However, some of what Al tried to explain fell out of our collective brains as was discovered when these co-workers tried to show OTHER co-workers how to run their new creations.