STANDARD DATA DICTIONARY #19.1 -- SECURITY KEY FILE 3/24/25 PAGE 1 STORED IN ^DIC(19.1, (603 ENTRIES) SITE: WWW.BMIRWIN.COM UCI: VISTA,VISTA (VERSION 8.0) DATA NAME GLOBAL DATA ELEMENT TITLE LOCATION TYPE ----------------------------------------------------------------------------------------------------------------------------------- This file holds the names of security keys that are used to lock options. To lock an option, the name of the key is entered in the Lock field of the Option File. To permit a user to unlock the option, the user's name is entered in the Holder field of this file. It is cross-referenced by name and holder. DD ACCESS: # RD ACCESS: # WR ACCESS: # DEL ACCESS: # LAYGO ACCESS: # APPLICATION GROUP(S): XU, XQ POINTED TO BY: SUBORDINATE KEY field (#.01) of the SUBORDINATE KEY sub-field (#19.13) of the SECURITY KEY File (#19.1) MUTUALLY EXCLUSIVE KEYS field (#.01) of the MUTUALLY EXCLUSIVE KEYS sub-field (#19.15) of the SECURITY KEY File (#19.1) USER ACCESS AUTHORIZATION field (#.9) of the ACCESSION File (#68) USER ACCESS AUTHORIZATION field (#51) of the LOAD/WORK LIST File (#68.2) USER KEY NEEDED field (#4) of the EXAMINATION STATUS File (#72) SECURITY KEY field (#.01) of the SECURITY KEY sub-field (#100.985) of the DISPLAY GROUP File (#100.98) ACCESS field (#.01) of the ACCESS sub-field (#101.03) of the PROTOCOL File (#101) KEY field (#.01) of the KEYS sub-field (#200.051) of the NEW PERSON File (#200) DELEGATED KEY field (#.01) of the DELEGATED KEYS sub-field (#200.052) of the NEW PERSON File (#200) KEY field (#6) of the RECALL REMINDERS PROVIDERS File (#403.54) A PRIVILEGE field (#8) of the MH TESTS AND SURVEYS File (#601.71) SECURITY KEY field (#.01) of the SECURITY KEY sub-field (#991.112) of the CIRN HL7 EXCEPTION TYPE File (#991.11) SECURITY KEYS field (#.01) of the SECURITY KEYS sub-field (#2006.1665) of the BP MAIL MESSAGE sub-field (#2006.166) of the IMAGING SITE PARAMETERS File (#2006.1) CROSS REFERENCED BY: NAME(AC), NAME(B), DESCRIPTIVE NAME(E) 19.1,.01 NAME 0;1 FREE TEXT (Required) This is the name of the key, beginning with the package prefix INPUT TRANSFORM: K:X[""""!($A(X)=45) X I $D(X) D CHKNAME^XQ5 K:$L(X)>27!($L(X)<3)!'(X'?1P.E)!(X'?.ANP) X LAST EDITED: JAN 22, 1992 HELP-PROMPT: Enter the name of the key, prefixed with the package code DESCRIPTION: Each entry in this File is the name of a key that defines some characteristic or capability for individual specified users. The capability might be access to some OPTION (file 19) which is permited with the authorization. Other functionalities (such as allowing scheduling overbook) might also be allowed only if the key is held. Keys are named with the standard package prefix formats; a 2-4 character package prefix for standard names or Z. DELETE TEST: 200,0)= I $D(^VA(200,"AB",DA)) W " Can't delete" UNEDITABLE NOTES: XXXX--CAN'T BE ALTERED EXCEPT BY PROGRAMMER CROSS-REFERENCE: 19.1^B 1)= S ^DIC(19.1,"B",$E(X,1,30),DA)="" 2)= K ^DIC(19.1,"B",$E(X,1,30),DA) CROSS-REFERENCE: 19.1^AC^MUMPS 1)= Q 2)= K ^XUSEC(X),^VA(200,"AK."_X) 3)= Cleanup This X-ref will clean-up the XUSEC global if a key is removed by an app calling DIK directly. If the UNEDITABLE flag was removed and the KEY name changed it would clean-up the old name from XUSEC BUT would not set in the new name. to do that the MUMPS X-ref on the KEY sub-file of the NEW PERSON file. will need to be re-indexed. 19.1,.02 DESCRIPTIVE NAME 0;2 FREE TEXT INPUT TRANSFORM: K:X[""""!($A(X)=45) X I $D(X) K:$L(X)>30!($L(X)<2) X LAST EDITED: SEP 29, 1989 HELP-PROMPT: Answer must be 2-30 characters in length. DESCRIPTION: This is a more descriptive name for the KEY than allowed in the namespaced name field. CROSS-REFERENCE: 19.1^E^MUMPS 1)= S %X=X X "F %=1:1:$L(%X) I $E(%X,%)?1L S %X=$E(%X,1,%-1)_$C($A(%X,%)-32)_$E(%X,%+1,99)" S ^DIC( 19.1,"E",%X,DA)="" 2)= S %X=X X "F %=1:1:$L(%X) I $E(%X,%)?1L S %X=$E(%X,1,%-1)_$C($A(%X,%)-32)_$E(%X,%+1,99)" K ^DIC( 19.1,"E",%X,DA) 3)= This is a uppercase only X-ref of the field. This is a normal X-ref that has the special code to see that the X-ref is in all uppercase for easy lookup. 19.1,.03 PERSON LOOKUP 0;3 SET 'l' FOR LOOKUP; LAST EDITED: SEP 27, 1989 HELP-PROMPT: Should a X-ref of holders of this key be made for person lookup. DESCRIPTION: This field when set to 'lookup' will build a X-ref on the NEW PERSON file of all holders of the key. This will be under a X-ref of 'AK.'_so that a package can lookup members of a group. There is a standard SECURITY KEY that will be sent out of 'PROVIDER' with the lookup flag set. Then a package can do a lookup of PROVIDER's with the following code: S DIC="^VA(200,",D="AK.PROVIDER",DIC(0)="AEQ" D IX^DIC 19.1,.04 KEEP AT TERMINATE 0;4 SET 'y' FOR YES; 'n' FOR NO; LAST EDITED: SEP 24, 1991 HELP-PROMPT: Does the user need to keep this key when terminated. DESCRIPTION: If this field is set to YES (1) then this key will not be removed from a user in the New Person file when they are terminated. One example is the 'PROVIDER' key. 19.1,.05 SEND TO J2EE 0;5 SET '0' FOR No; '1' FOR Yes; LAST EDITED: FEB 22, 2005 DESCRIPTION: This field controls if this is a Security Key that should be sent to the J2EE application server for temporary role assignment. If this field is set to 'Yes' then this Security Key can be sent to the application server. 19.1,1 DESCRIPTION 1;0 WORD-PROCESSING #19.11 DESCRIPTION: This is a short description of the security key, indicating what the key locks out, and what class of users should be assigned the key. This is a description of the privileges accorded holders of this key HELP-PROMPT: Enter a description of what privileges the key gives 19.1,3 SUBORDINATE KEY 3;0 POINTER Multiple #19.13 DESCRIPTION: Subordinate authorization are "given" when the "master" authorization is given. This allows easier and more efficient delegation of authorizations. 19.13,.01 SUBORDINATE KEY 0;1 POINTER TO SECURITY KEY FILE (#19.1) (Multiply asked) INPUT TRANSFORM:S DIC("S")="I $D(^XUSEC(""XUMGR"",DUZ))!$S($D(^VA(200,DUZ,52,+Y,0)):$P(^(0),U,4),1:0)" D ^DIC K DIC S DIC=DIE,X=+Y K:Y<0 X LAST EDITED: SEP 30, 1992 HELP-PROMPT: A cluster of keys to allow easier key assignment. DESCRIPTION: Subordinate authorization is "given" at the same time the "master" authorization is "given". This permits more efficient and easier delegation of authority. SCREEN: S DIC("S")="I $D(^XUSEC(""XUMGR"",DUZ))!$S($D(^VA(200,DUZ,52,+Y,0)):$P(^(0),U,4),1:0)" EXPLANATION: The person clustering authorizations must have the authority not only to delegate but also the auth ority to give others the authority to delegate. CROSS-REFERENCE:19.13^B 1)= S ^DIC(19.1,DA(1),3,"B",$E(X,1,30),DA)="" 2)= K ^DIC(19.1,DA(1),3,"B",$E(X,1,30),DA) 19.1,4 GRANTING CONDITION 4;E1,245 MUMPS INPUT TRANSFORM: K:$L(X)>245 X D:$D(X) ^DIM LAST EDITED: SEP 27, 1989 HELP-PROMPT: This is Standard MUMPS code. DESCRIPTION: This is MUMPS code that set $T true if its OK for the person to be granted this key. WRITE AUTHORITY: @ 19.1,5 MUTUALLY EXCLUSIVE KEYS 5;0 POINTER Multiple #19.15 19.15,.01 MUTUALLY EXCLUSIVE KEYS 0;1 POINTER TO SECURITY KEY FILE (#19.1) (Multiply asked) LAST EDITED: MAY 20, 1994 HELP-PROMPT: Enter the name of a key that may not be held jointly with this one. CROSS-REFERENCE: 19.15^B 1)= S ^DIC(19.1,DA(1),5,"B",$E(X,1,30),DA)="" 2)= K ^DIC(19.1,DA(1),5,"B",$E(X,1,30),DA) FILES POINTED TO FIELDS SECURITY KEY (#19.1) SUBORDINATE KEY:SUBORDINATE KEY (#.01) MUTUALLY EXCLUSIVE KEYS:MUTUALLY EXCLUSIVE KEYS (#.01) INPUT TEMPLATE(S): PRINT TEMPLATE(S): SORT TEMPLATE(S): FORM(S)/BLOCK(S):