For each field security policy, set up the form mapping. Use the form mapping to define which tables, forms, and fields you want to include in the field security policy.
Name | Responsible | Description |
---|---|---|
Record form mapping |
System administrator |
Use the form mapping to define which tables, forms, and fields you want to include in the field security policy. For a specific field security policy, you can record the relevant form mapping. When recording, you can record several forms. For each form that you record, a separate form mapping record is created. |
Review form mapping |
System administrator |
Use the form mapping to define which tables, forms, and fields you want to include in the field security policy. To create a form mapping, you record it. The recording results are stored in the Form mapping table. You can review and edit the recorded form mapping. Usually, you only delete undesired recorded fields from the form mapping. To add a field to the form mapping, record it. |
Apply form mapping to field security policy |
System administrator |
Once a form mapping for a field security policy is recorded and review is finished, you can apply the form mapping to the field security policy. If you do so, all form mapping records, of the same field security policy as the selected form mapping record, are applied. For each form mapping record, this data is copied to the field security policy:
|