The Browser gives a view of all configurations in. You can easily filter what configurations are shown, by selecting configurations of a specific type or owned by a specific user.
By default all configurations are displayed. The browser supports a set of operations that can be performed for the configurations; cut, copy, paste, delete, rename, encrypt, decrypt and validate.
For each configuration you can also open a Properties dialog where permissions can be set and where you can view history, references and basic information.
From the Browser you can also see both active configurations, and historical ones using the Historic button.
Note!
When using the default authentication method, configurations created by LDAP authenticated users may not appear in the Configuration Browser. In order to make these configurations visible, change the owner in Properties dialog that you can open from the right-click menu in the Configuration Navigator. The new owner must be listed in the Users tab in the Access Controller.
The Browser
Menus
The following buttons are available on the Browser.
Buttons | Description |
---|---|
Search | Opens up a text field that will allows you to filter or locate certain configurations in the browser. |
Filter | Select this option to open the Filter Configurations dialog:
|
Select this option to refresh the information in the table. | |
Historic | Historic mode will display configurations that have been removed from the system. Clicking on this button will bring you to the Historic view mode. For more information regarding the Historic view mode, refer to Switching between historic and active mode. Clicking on this button while in Historic view mode will return you to the Active view mode. |
This button is enabled only in the Historic view mode. Click to restore the selected configuration. Once you click Restore and confirm its validity, the configuration is active and available for use. Applicable only in the Historic view mode. Click to restore the selected configuration. Once you click Restore and confirm its validity, the configuration is active and available for use. Note! If the parent folder of the restores files no longer exits, these files are restored to the Default folder. |
Browser Table
Displays all configurations for the selected folder. If you right click on a configuration, a pop-up menu will be displayed from which you can perform most of the actions that are listed in the Right-click Menu.
The columns in the Browser table are:
Column | Description |
---|---|
Name | Displays the folder that contains the configuration as well as the icon representing the application type and the name of the configuration. A lock symbol will be displayed on the icon if the configuration is locked and being edited by another user. A key symbol will be displayed on the icon if the configuration is encrypted. |
Perm | Displays the permissions granted to the current user of the configuration. Permissions are shown as R (Read), W (Write) and X (eXecute). If the configuration is encrypted, an E will also be added. For further information about permissions, see the section below, Permissions Tab. |
Owner | Displays the username of the user that created the configuration. The owner can:
|
Modified By | Displays the username of the user that made the last modifications to the configuration. |
Modified Date | Displays the date when the configuration was last modified. |
Right-click Menu
Right-clicking a folder or configuration in the table opens the following menu:
Entry | Description |
Column View | Allows you to select the type of view for the Browser table. The options available are:
|
Select this option to refresh the browser. Alternatively, you can press F9 to refresh. | |
Expand All | Select this option to expand all of the folders to display the folders and all the configurations that they contain. |
Collapse All | Select this option to collapse the folders so only the folders are visible. |
New Configuration | Lists all configurations available. By selecting a configuration profile, opens the New tab to set up a new configuration. |
Select this option to create a new folder. | |
Open Configuration(s) | Select this option to view the selected configuration. |
Select this option to export the selected configurations. The System Exporter opens with the configurations pre-selected. Note! When exporting from the Browser, configuration dependencies are not automatically selected. To select configuration dependencies, select the Select Dependencies check box in the System Exporter. For further information see System Exporter. | |
When you have a workflow package in your configuration, you can use this option to download the workflow package as an mzp file to your local file system. For more information about Workflow Packages, refer to Workflow Packages | |
Cut | Select this option to put one or more configurations on the clipboard for moving the configuration to another location. Select the menu option Paste in the folder where the configurations should be stored. This option is not applicable if the configuration is locked |
Copy | Select this option to put one or more configurations on the clipboard for copy the configurations to another location. Select the menu option Paste in the folder where the copied configurations should be stored. |
Select this option to store configurations that have been cut or copied to the clipboard into a folder. | |
Delete | Select this option to delete the selected configuration(s). If the configuration is referenced by another configuration, a warning message be displayed, informing you that you cannot remove the configuration. You can check the references using the Reference tab on the Properties dialog. For further information, see the section below, Properties. |
Rename | Select this option to change the name of the selected configuration. Take special precaution when renaming a configuration. If, for example, an APL script is renamed, workflows that are using this script will become invalid. This is especially important to know when renaming folders containing many ultra format configurations or APL. Renaming a folder with ultra formats or APL configurations will make all referring configurations invalid. Alternatively, you can press F12 to rename |
Encrypt | Select this option to encrypt the selected configurations. |
Decrypt | Select this option to decrypt the selected configurations. |
Validate | Select this option to validate the configuration. A validation message will be shown to the user. |
Show Properties | Select this option to launch the Properties dialog for the selected configuration. For further information, see the section below, Properties. |
Documentation | Select this option to use the Documentation Generator to create documentation for the selected configuration. Note! This function has yet to be implemented. |
Switching Between Historic and Active mode
The Browser provides you with two View Modes to choose from; the Active view mode lists configurations that are saved in the system, and the Historic view mode that lists configurations that had been deleted.
Historic view mode also provides you with the unique identification key that the system gives to every configuration.
The Browser is in the Active view mode, by default every time you open the Browser. Click on the Historic button to enter the Historic view mode.
Historic view mode. The highlighted Historic button and the table structure denotes that you are not in the Historic view mode.
Historic View Table
The table in the Historic view mode contains the following columns:
Column | Description |
---|---|
Name | Displays the folder that contains the configuration as well as the icon representing the application type and the name of the configuration. A key symbol will be displayed on the icon if the configuration was encrypted. |
Ver | Displays the configuration version. |
Key | Displays the internal key used to identify the configuration. |
Modified By | Displays the user name of the user that made the last modifications to the configuration. |
Modified Date | Displays the date when the configuration was last modified. |
Comment | Displays additional information about why the configuration is in Historic view mode. |
Properties
To open the Properties dialog, either right-click on a configuration, or select a configuration, click on the Edit menu and select the Show Properties option.
This dialog contains four different tabs:
Tab | Description |
---|---|
Basic | This tab is displayed by default. It shows the details of the configuration. |
Permissions | This tab is where you set permissions for different users. |
References | This tab is where you can see which other configurations that are referenced by the selected configuration. |
History | This tab displays the revision history for the configuration. |
Info!
Basic Tab
The Basic tab is the default tab in the Properties dialog and contains the following information:
Item | Description |
---|---|
Name | Displays the name of the configuration. |
Type | Displays the type of configuration. |
Key | Displays the internal key used to identify the configuration. |
Folder | Displays the name of the folder in which the configuration is located. |
Version | Displays the version number of the configuration, see the History folder for further information about the different versions. |
Permissions | Displays the permissions granted to the current user of the configuration. Permissions are shown as R (Read), W (Write) and X (eXecute). If the configuration is encrypted, an E will also be added. For further information about permissions, see the section below, Permissions Tab. |
Owner | Displays the username of the user that created the configuration. The owner can:
|
Modified by | Displays the user name of the user that made the last modifications to the configuration. |
Modified | Displays the date when the configuration was last modified. |
If you want to use the information somewhere else you can highlight the information and press CTRL-C to copy the information to the clipboard.
Permissions Tab
The Permissions tab contains settings for what different user groups are allowed to do with the configuration:
As access permissions are assigned to user groups, and not individual users, it is important to make sure that the users are included in the correct user groups to allow access to different configurations.
R | W | X | E | Permission Description |
R | - | - | - | Allowed only to view the configuration, given that the user is granted access to the application. |
- | W | - | - | Allowed to edit and delete the configuration. |
- | - | X | - | Allowed only to execute the configuration. |
R | W | - | - | Allowed to view, edit and delete the configuration, given that the user is granted access to the application. |
- | W | X | - | Allowed to edit, delete and execute the configuration. |
R | - | X | - | Allowed to view and execute the configuration, given that the user is granted access to the application. |
R | W | X | - | Full access. |
- | - | - | E | Encrypted. |
References Tab
The References tab contains information about which other configurations that the current configuration is referring to, and which other configurations that the current configuration is referenced by:
The References tab contains two tabs:
Tab | Description |
---|---|
Used By | This tab displays all the configurations that uses the current configuration. |
Uses | This tab displays all the configurations that the current configuration uses. |
If you want to edit any of the configurations, you can double-click on it and it will be opened in a tab.
History Tab
The History tab contains version information for the configuration:
In the table, the following columns are included:
Column | Description |
---|---|
Version | Displays the version number. |
Modified Date | Displays the date and time when the version was saved. |
Modified By | Displays the user name of the user that saved the version. |
Comment | Displays any comments for the version. |
If you want to clear the history for the configuration, click on the Clear Configuration History button. The version number will not be affected by this.
Add Comment