How to constrain CallType by a HEAT user's Security Role

Version 2

    Details

    The document attached to this article outlines the steps needed to set up a validation constraint that allows you to constrain the Call Type by the user's security role (ie. if some call types should only be allowed for certain users)


    Resolution

     

    1. Login to the HEAT Administration Module and select File>> New Edit Set.
    2. Click Yes when the confirmation dialog box appears.
    3. Click on the CallLog table under the Tables section.
    4. Click on Open Table.
    5. Click on the Add field button to add the HEATSecGroup field.
    6. Create the definition as shown below. Ensure the length of the field accommodates the character length from the SecGroup field from the Tracker table.
    7. Set this field to Auto fill as Depends on: Tracker and Fill From: SecGroup.
    8. Click OK to return to the CallLog table view. It is not necessary to add the field to the form. Close the CallLog table.
    9. Click on the CallType table and then Open Table.
    10. Click on the Add field button to add the HEATSecGroup field.
    11. Create the definition as shown below. Ensure the length of the field accommodates the character length from the SecGroup field from the Tracker table.
    12. Set this field to Validate to the Tracker table, SecGroup field. If you want to be able to choose Security Groups from a drop down, be sure to check the “Show selections….” Option.
    13. Click OK to return to the CallType table view.
    14. Click on the Add Field to Form button.
    15. Position the field and edit any attributes as desired.
    16. Commit the Edit Set.
    17. Once the Edit Set commits, log back into the Administrator module and go to Database>>Validation Constraints.
    18, Click on Add to define a new constraint.
    19. The first item you will have to define is the table and field you are constraining. In this case, it is the CallLog table and the CallType field.
    20. Second item you must define is the field that will provide the constraint. Select the HEATSecGroup field from the drop down.
    21. The Value section is the third area you must define. This is the table and field that provides the value which must match the validation field providing the constraint. The field value should match the field chosen in the Validation section above. In this case, you will select the CallLog table and the HEATSecGroup field.
    22. Note the two options at the bottom of the window. The first option is checked at the discretion of the Administrator. If the second one, Enforce the constraint, is not checked, then the constraint will not be enforced in Call Logging.
    23. Log into the Call Logging module and go to Accessory and then Table Maintenance.
    24. Choose the CallType table from the Table drop down.
    25. Click the Call-Type you wish to associate to a Security Group.
    26. Select the Security Group (from the drop down) to associate with the chosen CallType.
    27. Click the Save icon.
    28. Repeat steps 24-26 until all of your CallTypes have been associated with a Security Group of your choice.
    29. Important! Keep in mind that if multiple Security Groups will be associated with a particular Call Type, you must have multiple entries for the Call Type itself. For example, if 3 security groups will be associated with the Call Type “E-mail”, then the table must have 3 entries for the E-mail Call Type, each associated with one of the security groups.