<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Permissions Logic</title><link>https://sourceforge.net/p/protohrm/wiki/Permissions%2520Logic/</link><description>Recent changes to Permissions Logic</description><atom:link href="https://sourceforge.net/p/protohrm/wiki/Permissions%20Logic/feed" rel="self"/><language>en</language><lastBuildDate>Thu, 12 Jan 2012 14:45:26 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/protohrm/wiki/Permissions%20Logic/feed" rel="self" type="application/rss+xml"/><item><title>WikiPage Permissions Logic modified by Chriss Ioannou</title><link>https://sourceforge.net/p/protohrm/wiki/Permissions%2520Logic/</link><description>&lt;pre&gt;--- v2 
+++ v3 
@@ -2,17 +2,19 @@
 
 Users and groups must be defined in order to access the system. All permissions are checked against the groups.
 
-    Each permission has various properties
-
+Each permission has a user friendly translatable description and "tagdata" , tagdata is the internal way for the system to understand what the user wants to do and if he is allowed to do it. 
+
+Tagdata logic:
+
+
     - Menu Actions / Entities (e.g. Companies table) : Prefix "ma_"
     - System Actions : Prefix "sa_"
     - Menu items : Permissions table flag
-    - Data related actions (e.g. Allow edit of companies table)
-        (View, Insert, Update, Delete, Print, Export) , no prefix used.
+    - Data related actions (View, Insert, Update, Delete, Print, Export) , no prefix used.
     - Documents actions : Prefix "do_"
 
+
 The permissions subsystem uses the above logic to allow/permit users view &amp; edit data or documents.
-
 
 Each time the user requests an action, which is either displayed to him or maliciously someone tries to access this functionality, the system checks if the usergroup is allowed access to that function by checking the user permissions table.
 
&lt;/pre&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Chriss Ioannou</dc:creator><pubDate>Thu, 12 Jan 2012 14:45:26 -0000</pubDate><guid>https://sourceforge.neta003e4b9b3ae283328441183a0071dec03358d26</guid></item><item><title>WikiPage Permissions Logic modified by Chriss Ioannou</title><link>https://sourceforge.net/p/protohrm/wiki/Permissions%2520Logic/</link><description>&lt;pre&gt;--- v1 
+++ v2 
@@ -14,7 +14,7 @@
 The permissions subsystem uses the above logic to allow/permit users view &amp; edit data or documents.
 
 
-Each time the use requests an action, either it's displayed or maliciously someone tries to access this functionality, the system checks if the usergroup is allowed access to that function by checking the user permissions table.
+Each time the user requests an action, which is either displayed to him or maliciously someone tries to access this functionality, the system checks if the usergroup is allowed access to that function by checking the user permissions table.
 
 
 
&lt;/pre&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Chriss Ioannou</dc:creator><pubDate>Thu, 12 Jan 2012 14:42:15 -0000</pubDate><guid>https://sourceforge.net396e4f0c453e4eefce898ea68a2cdd9ef52564ce</guid></item><item><title>WikiPage Permissions Logic modified by Chriss Ioannou</title><link>https://sourceforge.net/p/protohrm/wiki/Permissions%2520Logic/</link><description>**ProtoHRM permissions logic** 

Users and groups must be defined in order to access the system. All permissions are checked against the groups.

    Each permission has various properties

    - Menu Actions / Entities (e.g. Companies table) : Prefix "ma_"
    - System Actions : Prefix "sa_"
    - Menu items : Permissions table flag
    - Data related actions (e.g. Allow edit of companies table)
        (View, Insert, Update, Delete, Print, Export) , no prefix used.
    - Documents actions : Prefix "do_"

The permissions subsystem uses the above logic to allow/permit users view &amp; edit data or documents.


Each time the use requests an action, either it's displayed or maliciously someone tries to access this functionality, the system checks if the usergroup is allowed access to that function by checking the user permissions table.




</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Chriss Ioannou</dc:creator><pubDate>Thu, 12 Jan 2012 14:40:18 -0000</pubDate><guid>https://sourceforge.net57ebc5f8a07ce69f10a2ae777cded3e1b36f8430</guid></item></channel></rss>