Once a menu system has been constructed, you will discover that the Menu
Driver is attractive and simple to use. After a menu is displayed, users
can select the desired option using the UP, DOWN, LEFT, or RIGHT cursor
movement keys. Alternatively, users can enter one or more characters of
the mnemonic which is displayed next to each option. The Selection
Pointer will move to the appropriate option, which can then be invoked by
simply pressing [RETURN].
TK-GUARDIAN also provides user-definable shortcuts to any selection from
any menu. Using shortcuts, users can jump from any menu to any option on
another menu without having to traverse the entire menu structure.
We believe that TK-GUARDIAN is the most effective system of its kind
available for Standard MUMPS systems. We hope you will be completely
satisfied with it. Should you have any questions or comments regarding
TK-GUARDIAN, or any of PG&A's TKProducts, please give us a call.
INTRODUCTION
The TK-GUARDIAN Security Management System is an ANSI MUMPS-based software
product which provides an effective solution to the need for the
centralized management of application menus and system security. It can
easily be tailored to meet the most stringent (or relaxed) requirements
for system security.
As is the case with all PG&A products, it is screen oriented. Yet it can
easily tie both screen and scroll based packages together into a friendly
environment which is both efficient and effective.
This manual is designed to provide the information necessary for system
managers and/or programmers to create and maintain such a system. The
sections outlined below will assist you in getting started, in addition to
serving as a reference later.
Overview
This section provides general information regarding TK-GUARDIAN's
capabilities and is a useful starting point. Getting Started
This section provides general information regarding TK-GUARDIAN's
capabilities and is a useful starting point. Getting Started
This section provides step-by-step instructions which will help install
and
initialize the system, as well as providing an introduction to using
TK-GUARDIAN menus.
Maintenance Functions
This section is provided to assist in the continuing maintenance of the
system. Included will be instructions for maintaining the menu system as
well as system security.
Programming Considerations
This section provides useful
information regarding
the TK-GUARDIAN
environment and special
variables.
System Information
Appendix A is included to provide further information regarding
Toolkit Initialization and Terminal Parameters. OVERVIEW
TK-GUARDIAN is, by necessity and design, both a menu management system and
a security management system. It is through the complete integration of
these functions that TK-GUARDIAN is able to provide its many features.
Some of these features are discussed below. MENU MANAGEMENT
TK-GUARDIAN provides a comprehensive Menu Editor which makes the job of
creating and maintaining application menus simple. Each menu can provide
as many as forty eight individual options which can branch to other menus,
other PG&A Toolkit Products, or your system applications. There is no
practical limit to the number of menus you can build using the TK-GUARDIAN
Menu Editor. SECURITY MANAGEMENT
In addition to menu management, TK-GUARDIAN offers a variety of
approaches to securing application systems. User Security
When user security is desired, users are added to TK-GUARDIAN's user
database and assigned a unique password and a list of available menu
options. At logon, users are prevented from accessing any
menu options which have not been assigned to them. Device Security
If device security is desired, each device on the system is added to
TK-GUARDIAN's device tables and given a list of available menu options.
At logon, users are prevented from accessing menu options not assigned to
their current device. Option Passwords
In addition to User and Device Security, individual menu options
can be assigned a password which must be accurately entered by users
before access to the option will be granted, regardless of their
security clearance. Combinations
Any combination of these approaches to securing application software can
be employed to tailor the security of your system to your specific
needs. Encryption
To help prevent the casual discovery and circulation of user passwords,
TK-GUARDIAN employs a proprietary keyword-based encryption algorithm
which makes it impossible for users and/or programmers to discover user
and selection passwords even when they are able to look through
TK-GUARDIAN's files.