6.2 Configuration Browser
The Configuration Browser gives a view of all configurations in . The user can easily filter what configurations to be shown, by selecting configurations of a specific type or owned by a specific user.
By default all configurations are displayed. The browser supports a set of operations that can be performed for the configurations; cut, copy, paste, delete, rename, encrypt, decrypt and validate.
For each configuration you can also open a Properties dialog where permissions can be set and where you can view history, references and basic information.
The browser supports drag and drop for moving and copying configurations between folders. Holding down the CTRL-key while dragging a configuration will result in a copy operation.
From the Configuration Browser you can also open the Configuration Tracer. In Configuration Tracer you see both active configurations, and historical ones.
To open the Configuration Browser, click the button in the upper left part of the Desktop window, and then select from the menu.
Note!
When using the default authentication method, configurations created by LDAP authenticated users may not appear in the Configuration Browser. In order to make these configurations visible, change the owner in Properties dialog that you can open from the right-click menu in the Configuration Navigator. The new owner must be listed in the Users tab in the Access Controller.Â
The Configuration Browser
Menus
In this section the different menus in the Configuration Browser, and their respective options are described.
File Menu | |
---|---|
Select this option to create a new folder. |
Edit Menu | |
Available when at least one configuration is selected in the browser. Select this option to open the selected configuration. | |
Available when at least one configuration is selected in the browser. Select this option to export the selected configurations. The System Exporter opens with the configurations pre-selected. Note! When exporting from the Configuration Browser, configuration dependencies are not automatically selected. To select configuration dependencies, select the Select Dependencies check box in the System Exporter. For further information see 6.12 System Exporter. | |
Select this option to put one or more configurations on the clipboard for moving the configuration to another location. Select the menu option Paste in the folder where the configurations should be stored. This option is not applicable if the configuration is locked. For further information see the section Locks in 1.2 Administration and Management. | |
Select this option to put one or more configurations on the clipboard for copy the configurations to another location. Select the menu option Paste in the folder where the copied configurations should be stored. | |
Select this option to store configurations that have been cut or copied to the clipboard into a folder. | |
Select this option to delete the selected configuration(s). If the configuration is referenced by another configuration, a warning message be displayed, informing you that you cannot remove the configuration. For further information see the section below, References Tab. Note! If you have enabled subfolders, you can only delete the last subfolder within a folder. | |
Select this option to change the name of the selected configuration. Take special precaution when renaming a configuration. If, for example, an APL script is renamed, workflows that are using this script will become invalid. This is especially important to know when renaming folders containing many ultra format configurations or APL. Renaming a folder with ultra formats or APL configurations will make all referring configurations invalid. Note! If you have enabled subfolders, you can only delete the last subfolder within a folder. | |
Select this option to encrypt the selected configurations. | |
Select this option to decrypt the selected configurations. | |
Select this option to validate the configuration. A validation message will be shown to the user. | |
Select this option to launch the Properties dialog for the selected configuration. For further information, see the section below, Properties. | |
Select this option to launch the Configuration Tracer. For further information, see the section below, Configuration Tracer. |
View Menu | |
Select this option to open the Filter Configurations dialog:
| |
This menu option contains a sub menu with all the configuration types and allows the user to filter the current view in the Configuration Browser to only display configurations of certain types. | |
This menu option contains a sub menu with all the users and allows the user to only display configurations that are owned by certain users. | |
Toggle Folder | Select this option to toggle between displaying the folders only as they were originally created, e g "batch_realtime_happy_workflow", or when subfolders are created in the folders in the folder pane, e g a folder named "batch" with hidden subfolders named "realtime", "happy" and "workflow". When subfolders are created, configurations are sorted into subfolders determined by the separator used in the folder name. The only valid separators in a folder name are "_" or "-". If any other character is used as a separator, or if the Platform property |
Expand All | Select this option to expand all of the folders to display the folders, subfolders and all the configurations that they contain. The only valid separators in a folder name are "_" or "-". If any other character is used as a separator, or if the Platform property |
Collapse All | Select this option to collapse the folders so only the folders are visible. The only valid separators in a folder name are "_" or "-". If any other character is used as a separator, or if the Platform property |
Refresh | Â Select this option to refresh the Folder Pane and the Configuration Browser Table. |
The Folder Pane
On the left side of the Configuration Browser all folders in the system are displayed. The content of the folder is shown in the configuration table. If you right click on a folder, a pop-up menu will be displayed, allowing the user to rename or delete the folder as well as create a new folder. The built-in Default folder cannot be modified.
Each folder listed in the folder pane has a number attach to its name. This number indicates how many configurations that are stored in that folder. The number will change when using a filter which makes it easy to see which folders contains configurations of a specific type.
Configuration Browser Table
Displays all configurations for the selected folder. If you right click on a configuration, a pop-up menu will be displayed from which you can perform most of the actions that are listed in the menu.
The columns in the Configuration Browser table are:
Column | Description |
---|---|
Type | Contains an icon representing the application type. |
Name | Displays the name of the configuration. |
Lock | Indicates whether the configuration is locked or not. |
Perm | Displays the permissions granted to the current user of the configuration. Permissions are shown as R (Read), W (Write) and X (eXecute). If the configuration is encrypted, an E will also be added. For further information about permissions, see the section below, Permissions Tab. |
Owner | Displays the username of the user that created the configuration. The owner can:
|
Modified By | Displays the username of the user that made the last modifications to the configuration. |
Modified Date | Displays the date when the configuration was last modified. |
Configuration Tracer
The Configuration Tracer provides you with two View Modes to choose from; the Active view mode lists configurations that are saved in the system, and the Historic view mode that lists historical configurations. The latter lists configurations that had been deleted.
The Configuration Tracer also provides you with the unique identification key that the system gives every configuration.
The Configuration Tracer
Menus
Edit Menu | |
This option is enabled when in Active mode, and when a Configuration is selected. When you select a Configuration it opens in a tab. | |
Applicable only in the Historic view mode. Click to restore the selected configuration. Once you click Restore and confirm its validity, the configuration is active and available for use. |
View Menu | |
Active | Active mode will display the same configurations as those displayed in the Configuration Browser. |
Historic | Historic mode will display configurations that have been removed from the system. The user may select to restore such a configuration. |
Select this option to refresh the information in the table. |
Table
The table in the Configuration Tracer contains the following columns:
Column | Description |
---|---|
Type | Contains an icon representing the application type. |
Folder | Displays the name of the folder that contains the configuration. |
Name | Displays the name of the configuration. |
Enc | Indicates if the configuration is encrypted or not. If it is encrypted, this column will display an 'E', otherwise a dash '-'. |
Ver | Displays the configuration version. |
Key | Displays the internal key used to identify the configuration. |
Modified By | Displays the user name of the user that made the last modifications to the configuration. |
Modified Date | Displays the date when the configuration was last modified. |
Properties
To open the Properties dialog, either right-click on a configuration, or select a configuration, click on the Edit menu and select the Properties option.
The Properties dialog box
This dialog contains four different tabs:Â Basic, which contains basic information about the configuration, Permission, where you set permissions for different users, References, where you can see which other configurations that are referenced by the selected configuration, or that refers to the selected configuration, and History which displays the revision history for the configuration. The Basic tab is displayed by default.
Basic Tab
The Basic tab is the default tab in the Properties dialog and contains the following information:
Item | Description |
---|---|
Name | Displays the name of the configuration. |
Type | Displays the type of configuration. |
Key | Displays the internal key used to identify the configuration. |
Folder | Displays the name of the folder in which the configuration is located. |
Version | Displays the version number of the configuration, see the History folder for further information about the different versions. |
Permissions | Displays the permissions granted to the current user of the configuration. Permissions are shown as R (Read), W (Write) and X (eXecute). If the configuration is encrypted, an E will also be added. For further information about permissions, see the section below, Permissions Tab. |
Owner | Displays the username of the user that created the configuration. The owner can:
|
Modified by | Displays the user name of the user that made the last modifications to the configuration. |
Modified | Displays the date when the configuration was last modified. |
If you want to use the information somewhere else you can highlight the information and press CTRL-C to copy the information to the clipboard.
Permissions Tab
The Permissions tab contains settings for what different user groups are allowed to do with the configuration:
The Permissions tab
As access permissions are assigned to user groups, and not individual users, it is important to make sure that the users are included in the correct user groups to allow access to different configurations.
R | W | X | E | Permission Description |
R | - | - | - | Allowed only to view the configuration, given that the user is granted access to the application. |
- | W | - | - | Allowed to edit and delete the configuration. |
- | - | X | - | Allowed only to execute the configuration. |
R | W | - | - | Allowed to view, edit and delete the configuration, given that the user is granted access to the application. |
- | W | X | - | Allowed to edit, delete and execute the configuration. |
R | - | X | - | Allowed to view and execute the configuration, given that the user is granted access to the application. |
R | W | X | - | Full access. |
- | - | - | E | Encrypted. |
References Tab
The References tab contains information about which other configurations that the current configuration is referring to, and which other configurations that the current configuration is referenced by:
The References tab
The References tab contains two tabs; Used By , that displays all the configurations that uses the current configuration, and Uses , that displays all the configurations that the current configuration uses.
If you want to edit any of the configurations, you can double-click on it and it will be opened in a tab.
History Tab
The History tab contains version information for the configuration:
The History tab
In the table, the following columns are included:
Column | Description |
---|---|
Version | Displays the version number. |
Modified Date | Displays the date and time when the version was saved. |
Modified By | Displays the user name of the user that saved the version. |
Comment | Displays any comments for the version. |
If you want to clear the history for the configuration, click on the Clear Configuration History button. The version number will not be affected by this.