Security reports

Using the report process, you can create a report on the permissions for functional or object security privileges assigned to user and group accounts in your network.

You can also create a report on the contents of an archive or compare file or list archive directory entries that meet criteria you supply.

Security reports

Security permissions allow or deny roles, which consist of user and group accounts, privileges such as the ability to open a dialog, run a process, or modify a specific object. Use security reports to see which users and groups have permissions for these privileges and the roles to which the permissions apply. For more information about security privileges, see Optim Security.

Depending on your specifications, you can create a report that:

Report process

The report process runs on the workstation (not on the Optim server). Specifications for a report process are stored as a report request. Use the report request to provide the report criteria and processing options. The Report Process Report dialog displays the report.

Run or schedule

You can process a report request immediately by selecting File > Run or you can schedule the request for processing at a later time by selecting File > Schedule.

Naming Conventions

A fully qualified report request name is in the form identifier.name, where:

identifier
Identifier assigned to the report request (1 to 8 characters).
name
Base name assigned to the report request (1 to 12 characters).

A logical set of naming conventions can identify the use for each report request and be used to organize them for easy access.

Section Contents

This section explains how to create, maintain and process a report request, including how to:



Feedback