subapplication modeling

If you model subapplications, keep in mind that you must only model subapplications when the role or the authorization that you want to link or assign to the subapplications is different from the role or authorization linked to the application that is linked to the activity.

Linking of subapplications

You can only link subapplications to an activity in a business process in the repository. You can however, link a role to a subapplication in the repository and in a project model.

Roles and authorization

When you model subapplications, restrict authorization on the highest level possible, as all modeled subsapplications that can be started from a modeled (main) application inherit the authorization from the (main) application. This means that you must model subapplications that are started from

the (main) application and subapplications that are started from subapplications. The higher the restrictions are modeled, the more child-subapplications will inherit the restricted authorization.

If a role is linked to a main business process, the subprocess inherit that role. The role becomes valid, when the subprocess is used in the context of the main business process. When the subprocess is used in another main business process, other roles can become valid.

Inherited roles are not directly linked to the subprocess. So when a business process that is used as a subprocess is opened in the Enterprise Modeler Editor on its own, and not from the main business process, those inherited roles will not be known. These roles are, however, valid in the context of that business process.

The use of a file with subapplications

If you use a file with a list of subapplications in the following two sessions, that file must contain the subapplication codes and authorization codes

  • The Global change of Subapplication modeling (tgbrg5223m000) session.
  • The Print Subapplication authorizations (tgbrg5423m000) session.

The following table provides the authorization codes and their descriptions. Use, for example, VI for Unix, or Notepad for Windows NT to create a file that contain subapplications and their authorizations.

Table 1, Authorization constants for subapplications
ConstantConstant NameEnum Description
1no.permNo authorization
9displayDisplay
25printPrint/Display
29modifyModify/Print/Display
31insertInsert/Modify/Print/Display
32deleteFull Authorization

 

Beispiel

tccom0500m000 1 \ tccom0501m000 9 \ tccom4500m000 25 \ tccom4530m000 9 \ tccom4535m000 9 \ tccom4536m000 9 \ tccom4540m000 9 \ tccom4545m000 9 \ tcmcs1143m000 31

Carry out the following steps to create a file that contains subapplications and their authorizations:

  1. Enter the session code of the application that must be used as a subapplication.
  2. Enter any number of spaces.
  3. Specify the authorization by entering the corresponding number listed in table 1.
tccom0500m0001
tccom0501m0009
tccom4500m00025
tccom4530m0009
tccom4535m0009
tccom4536m0009
tccom4540m0009
tccom4545m0009
tcmcs1143m00031