The standard application tools include tools for users and managers and for administrative and development activities.
In the Access Manager the Tools tab is populated by the data transform rule pxPopulateTools. However, this rule can apply to another data transform rule, pyPopulateTools, which appends other tools that you define to the bottom of the Tools tab.
To add custom tools to the Access Manager, see the PDN article Adding custom tools to Access Manager.
The following table provides a list of standard application tools available in the system.
Tool category |
Tool name |
Description |
User & manager |
Tools intended for end users. These tools do not affect rule definitions. |
|
Dictionary |
Add words |
Add words to the spell checker dictionary. When authorized, an operator can right-click a word flagged by the spell checker and add it to the dictionary. |
Reports |
Provide criteria on reports |
Provide selection criteria on reports. When authorized, an operator can view the Available Values tab on the Pick Values pop-up window when customizing criteria for a report. |
Administrative & development |
Tools intended for system architects and developers. They can affect the run-time system display and behavior for end users. |
|
Application distribution |
Download SQL during import |
View and download SQL during application import for database administration. To access, click Designer Studio > Application > Distribution > Import. |
Enable automatic schema changes |
Enable automatic schema changes during application import. To access, clickDesigner Studio > Application > Distribution > Import. |
|
Export applications |
Export applications. To access, click Designer Studio > Application > Distribution > Export. |
|
Lock & roll other applications |
Lock and roll other applications. To access, click Designer Studio > Application > Structure > Other Applications. The Other Applications tab lists applications and Lock and Roll buttons. |
|
Preassemble an application |
Run the static assembler on demand to preassemble an application. To access, click access Designer Studio > System > Assembly> Static Assembler. |
|
Skim a ruleset |
Save the highest version of a rule into a new, higher ruleset version. To access, click Designer Studio > System >Refactor> RuleSets / Skim a RuleSet. |
|
Clipboard |
Execute activity on page |
Execute an activity on a page on the clipboard. When authorized, an operator can view the clipboard. Click a page and click Execute Activity on the Actions menu. |
Feedback Gadget |
Use the feedback gadget |
Use the feedback gadget. An authorized operator can see the gadget and send a message. |
Message queue management |
Modify JMS queue |
View, add, and remove messages on a JMS queue. |
View JMS queue |
View JMS message queue. |
|
Modify MQ queue |
View, add, and remove messages on an MQ queue. Operator can select a server and modify the MQ messages. |
|
View MQ queue |
View MQ message queue. Operator can select a server and view the MQ message queue. |
|
Reports |
Optimize property |
Use the one-click property optimization wizard. To access, clickDesigner Studio > System > Database > Column Population Jobs. |
Optimize schema |
Use the schema optimization wizard. To access, click Designer Studio > System > Database > Modify Schema. |
|
Rules & rulesets |
Private check-out |
Perform private checkout or checkin of rules. An authorized operator can perform private edits on locked rulesets. The system displays the Private Edit button. |
Security |
Access Manager: change authorizations |
Change role-based access by using Access Manager To access, click Designer Studio > Org & Security > Access Manager > Work & Process / Tools. An operator can modify authorizations in grids. |
Access Manager: view authorizations |
View role-based access by using Access Manager. To access, click Designer Studio > Org & Security > Access Manager > Work & Process / Tools. An operator can view, but not edit authorizations in grids. |
|
Configure system security policy settings |
Adjust the security policy rules for all operator IDs and passwords, mitigate brute-force attack with CAPTCHAs and audit levels. To access, clickDesigner Studio > System > Settings > Security Policies. |
|
Rule security analyzer |
Use the rule security analyzer to search through non-autogenerated rules, to find specific coding patterns that may indicate a security vulnerability. To access, click Designer Studio > Org & Security > Tools > Security > Rule Security Analyzer. |
|
Tracer |
Advanced tracer options |
Use tracer breakpoints and watch variables. When authorized, an operator can access the Tracer button on the Designer Studio toolbar and the Tracer tool displays the Breakpoints and Watch buttons on its toolbar. |
Basic tracer options |
Use settings, configure tracer output, use play and pause, and view details for any row. When authorized, an operator can access the Tracer button on the Designer Studio toolbar and the Tracer tool displays the Settings button on its toolbar. The system displays details on tracer events when a row is clicked. |
|
Use remote tracer |
Use remote tracer to connect to another requestor session. When authorized, an operator can access the Tracer button on the Designer Studio toolbar and the Tracer tool displays the Remote Tracer button on its toolbar. |
|
User interface |
Toolbar: Preview button |
An authorized operator can click the Preview button in Designer Studio. |
Toolbar: Run button |
An authorized operator can click the Run button in Designer Studio. |
|
Toolbar: Save As button |
An authorized operator can click the Save As button in Designer Studio. |
|
Live UI tool |
An authorized operator can click the Live UI tool. |