The Table Access report creates a Microsoft Excel workbook that contains the following columns with information about all the tables in the selected database:
▪ Table name
▪ Field name, if access is configured at the field level for the table
▪ Table or field description
▪ Application ID
The rest of the columns contain either the roles or the users within the selected database. The table access for each role or user is indicated in each column as described below:
▪ F—Full access. The role or user can add, modify, and delete all records in the table.
▪ V—View-only access. The role or user can access but not add, modify, or delete records in the table.
▪ A—Add access. The role or user can add records to the table.
▪ U—Update access. The role or user can update records in the table.
▪ D—Delete access. The role or user can delete records from the table.
▪ Blank—No access. The role or user cannot access records in the table.
The field access for each role or user is indicated in each column as described below:
▪ F—Full access. The role or user can add, modify, and delete the field.
▪ V—View-only access. The role or user can access but not add, modify, or delete the field.
▪ H—Hidden access. The role or user cannot access the field. The field is hidden.
▪ Blank—No access. The role or user cannot access records in the table.
Note
By default, any field-level rows on the report are
grouped and collapsed under their table row. Click the plus sign
on the left side of the table row to expand the field rows.
You must have Report Access permissions to run this report. Refer to Adding and Maintaining Users and Access Rights for more information.
To run the Table Access report, follow these steps:
1. Go to Reporting.
2. In the Report field, select Table Access Report.
3. In the Database field, select a database.
4. In the Security Type field, indicate whether you want to report data by role or by user.
5. Click Run.
6. When the report has finished running, click Download Report. The report can also be downloaded later by clicking the Work Requests button in the upper-right corner of Security Console.