You are here: Security > Access Manager > Tool authorization > Application tools

Application tools

The standard application tools include tools for users and managers and for administrative and development activities.

In the Access Manager the Tools tab is populated by the data transform rule pxPopulateTools. However, this rule can apply to another data transform rule, pyPopulateTools, which appends other tools that you define to the bottom of the Tools tab.

To add custom tools to the Access Manager, see the PDN article Adding custom tools to Access Manager.

The following table provides a list of standard application tools available in the system.

Tool category

Tool name

Description

User & manager

 

Tools intended for end users. These tools do not affect rule definitions.

Dictionary

Add words

Add words to the spell checker dictionary.

When authorized, an operator can right-click a word flagged by the spell checker and add it to the dictionary.

Reports

Provide criteria on reports

Provide selection criteria on reports.

When authorized, an operator can view the Available Values tab on the Pick Values pop-up window when customizing criteria for a report.

Administrative & development

 

Tools intended for system architects and developers. They can affect the run-time system display and behavior for end users.

Application distribution

Download SQL during import

View and download SQL during application import for database administration.

To access, click Designer Studio > Application > Distribution > Import.

 

Enable automatic schema changes

Enable automatic schema changes during application import.

To access, clickDesigner Studio > Application > Distribution > Import.

 

Export applications

Export applications.

To access, click Designer Studio > Application > Distribution > Export.

 

Lock & roll other applications

Lock and roll other applications.

To access, click Designer Studio > Application > Structure > Other Applications. The Other Applications tab lists applications and Lock and Roll buttons.

 

Preassemble an application

Run the static assembler on demand to preassemble an application.

To access, click access Designer Studio > System > Assembly> Static Assembler.

 

Skim a ruleset

Save the highest version of a rule into a new, higher ruleset version.

To access, click Designer Studio > System >Refactor> RuleSets / Skim a RuleSet.

Clipboard

Execute activity on page

Execute an activity on a page on the clipboard.

When authorized, an operator can view the clipboard. Click a page and click Execute Activity on the Actions menu.

Feedback Gadget

Use the feedback gadget

Use the feedback gadget.

An authorized operator can see the gadget and send a message.

Message queue management

Modify JMS queue

View, add, and remove messages on a JMS queue.

 

View JMS queue

View JMS message queue.

 

Modify MQ queue

View, add, and remove messages on an MQ queue.

Operator can select a server and modify the MQ messages.

 

View MQ queue

View MQ message queue.

Operator can select a server and view the MQ message queue.

Reports

Optimize property

Use the one-click property optimization wizard.

To access, clickDesigner Studio > System > Database > Column Population Jobs.

 

Optimize schema

Use the schema optimization wizard.

To access, click Designer Studio > System > Database > Modify Schema.

Rules & rulesets

Private check-out

Perform private checkout or checkin of rules.

An authorized operator can perform private edits on locked rulesets. The system displays the Private Edit button.

Security

Access Manager: change authorizations

Change role-based access by using Access Manager

To access, click Designer Studio > Org & Security > Access Manager > Work & Process / Tools. An operator can modify authorizations in grids.

 

Access Manager: view authorizations

View role-based access by using Access Manager.

To access, click Designer Studio > Org & Security > Access Manager > Work & Process / Tools. An operator can view, but not edit authorizations in grids.

 

Configure system security policy settings

Adjust the security policy rules for all operator IDs and passwords, mitigate brute-force attack with CAPTCHAs and audit levels.

To access, clickDesigner Studio > System > Settings > Security Policies.

 

Rule security analyzer

Use the rule security analyzer to search through non-autogenerated rules, to find specific coding patterns that may indicate a security vulnerability.

To access, click Designer Studio > Org & Security > Tools > Security > Rule Security Analyzer.

Tracer

Advanced tracer options

Use tracer breakpoints and watch variables.

When authorized, an operator can access the Tracer button on the Designer Studio toolbar and the Tracer tool displays the Breakpoints and Watch buttons on its toolbar.

 

Basic tracer options

Use settings, configure tracer output, use play and pause, and view details for any row.

When authorized, an operator can access the Tracer button on the Designer Studio toolbar and the Tracer tool displays the Settings button on its toolbar. The system displays details on tracer events when a row is clicked.

 

Use remote tracer

Use remote tracer to connect to another requestor session.

When authorized, an operator can access the Tracer button on the Designer Studio toolbar and the Tracer tool displays the Remote Tracer button on its toolbar.

User interface

Toolbar: Preview button

An authorized operator can click the Preview button in Designer Studio.

 

Toolbar: Run button

An authorized operator can click the Run button in Designer Studio.

 

Toolbar: Save As button

An authorized operator can click the Save As button in Designer Studio.

 

Live UI tool

An authorized operator can click the Live UI tool.