?
Solved

Field Access Restriction

Posted on 2000-02-29
5
Medium Priority
?
208 Views
Last Modified: 2013-12-18
Hi Experts,

how do I restrict the access to a specified field by roles ?

Hope you can help me

Thanks Tom
0
Comment
Question by:woodlott
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 2

Expert Comment

by:Paebdb
ID: 2568751
Two possibilities:
- hide the field depending on a role
- put the field in a section, there you can control read-write access according to roles
0
 
LVL 9

Expert Comment

by:Arunkumar
ID: 2571326
Hi,

Hiding a Field is not a true security to my knowledge.  But to some extent.
Hope paebdb agrees to this.

And make sure that the section you create is a Controlled Section.

-Arun
0
 

Author Comment

by:woodlott
ID: 2571718
Hi,

my problem is, it is a web-application and so I can't use sections. The next problem I have, the field must be shown for the read access.
0
 
LVL 6

Accepted Solution

by:
ghassan99 earned 15 total points
ID: 2573644
Use something like this in the 'hide when true' formula of the field:
@IsNotMember("[role_name]";@UserRoles)
or
@IsMember("[role_name]";@UserRoles)

If the user has (or hasnt) a certain role the field will just be hidden.

-Gus
0
 
LVL 9

Expert Comment

by:Arunkumar
ID: 2575959
Hi woodlott,

I will go for ghassan's way of approach.
Keep a computed and an editable in two lines one after the other.

Using the roles, hide one line at a time and show the other.  

When the computed field shows up you are in read mode.

When the editable field show up you are in edit mode.

One of my colleague got a same approach and worked perfectly !

Good Luck !

-Arun
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You’ve got a lotus Domino web server, and you have been told that “leverage browser caching” is a must do. This means that we have to tell the browser everywhere in the web to use cache. In other words, we set (and send) an expiration date in the HT…
Sometimes clients can lose connectivity with the Lotus Notes Domino Server, but there's not always an obvious answer as to why it happens.   Read this article to follow one of the first experiences I had with Lotus Notes on a client's machine, my…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
How to fix incompatible JVM issue while installing Eclipse While installing Eclipse in windows, got one error like above and unable to proceed with the installation. This video describes how to successfully install Eclipse. How to solve incompa…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question