Use this screen to view part data security information captured in the audit log table. Depending upon the audit log selection from the Configure Product Definition Settings screen, this screen allows you to view the following information:
Instances when part data security restricted items referenced in manufacturing bills of materials (MBOM), engineering bills of materials (EBOM), and documents are viewed by users that have been authorized for part data security access on the Manage Security Groups screen.
Instances when part data security restricted items referenced in MBOM, EBOM, and documents are attempted to be viewed by users that are not unauthorized for part data security access on the Manage Security Groups screen.
Instances when both authorized and unauthorized users accessed or attempted to access part data security restricted items referenced in MBOM, EBOM, and documents.
From the drop-down list, select the range option for generating requisitions based on the item category that you selected. Valid options are:
All — Select this option to include all available records. You cannot use the Start and End fields for this option. This option displays as the default selection.
One — Select this option to include only one record. You must enter that value in the Start field. You cannot use the End field for this option.
Range — Select this option to include a contiguous range of records. You must enter the beginning value for the range in the Start field and the ending value of the range in the End field.
From Beginning — Select this option to include all the records from the beginning of the available records to a specific record. You must enter the last value for the range in the End field. The Start field is disabled for this option.
To End — Select this option to include all the records from a specific record to the end of all the available records. You must enter the value from which the range should begin in the Start field. You cannot use the End field for this option.
Enter, or click to select, a value for the beginning of the range.
Enter, or click to select, a value for the end of the range.
Enter, or click to select, the commodity code. The field to the right displays the commodity code description.
Enter, or click to select, the employee ID. The field to the right displays the employee description.
Enter, or click to select, the part ID.
Enter, or click to select, the revision ID. The field to the right displays the revision description.
Select one of the following to indicate the type of audit log to be viewed:
Unauthorized Only — Attempts to access protected items that are subject to part data security by unauthorized users.
Authorized Only — Access to protected items that are subject to part data security by authorized users.
Unauthorized & Authorized — Access to protected items that are subject to part data security by authorized users and attempted access to items that are subject to part data security by unauthorized users.
This displays the timestamp when access to restricted part data was made.
This displays whether the audit log type used is unauthorized, authorized, or both.
This displays the user ID that accessed or attempted to access restricted part data.
This displays the employee ID associated to the user ID that accessed or attempted to access restricted part data.
This displays the employee name that corresponds with the Employee ID.
This displays the name of the application where access or access attempt was made.
This displays the subtask where access or access attempt was made.
This displays the restricted part ID.
This displays the restricted revision ID.
This displays the description of the restricted part/revision.
This displays the commodity number of the restricted part/revision.
This displays the description of the restricted commodity.
This displays the corresponding Transaction ID for the restricted part/revision.