MicroStrategy ONE

Developer Preferences: Developer category, Browsing preferences

From the Developer category on the left, you can specify the detailed information to be displayed for each object in MicroStrategy Developer. You can also choose to display all objects or just the objects for which you have certain access rights. Administrators can set display options for monitors in MicroStrategy Developer.

An access control list (ACL) is a group of permissions for an object

From the Developer category on the left, you can specify the following Browsing preferences:

  • Headers: Select the object details to be displayed in MicroStrategy Developer. These details appear when you click on a folder in the Folder List on the left side of MicroStrategy Developer, and the objects in that folder appear on the right side of MicroStrategy Developer. For example, you might display the Modification Time for each object if it is important to you to see objects updated after a certain date. The Object Name appears by default and cannot be removed.

  • Access Control: You can choose to display all objects or display only those objects with certain access rights that you select here:

  • Use Execute: Selecting this displays only those objects which you have permission to reference (or "use") when creating or modifying other objects such as reports or documents, and rights to execute reports or documents that reference this object.

  • Read: Selecting this displays only those objects for which you have permission to view the object's definition and access control list (ACL).

  • Write: Selecting this displays only those objects for which you have permission to modify the object's definition, but not the object's access control list (ACL).

  • Delete: Selecting this displays only those objects which you have permission to delete.

  • Control: Selecting this displays only those objects for which you have permission to modify the access control list or take ownership of.

  • Monitoring: Administrators can limit the number of objects displayed per page or per search for various managers, editors, and monitors. The lowest number you can enter is 10.

  • Maximum number of users displayed per page: You can limit the number of users displayed per page when you view users in the User Manager.

  • Maximum number of contacts displayed per page: If you own MicroStrategy Distribution Services, you can limit the number of contacts displayed per page when you view contacts. To view contacts, in the Folder List on the left expandAdministration, then expandDelivery Managers, then selectContacts.

  • Maximum number of monitoring objects displayed per page: You can limit the number of objects displayed on the right side of MicroStrategy Developer when you select any of the monitors in the Folder List on the left side of MicroStrategy Developer. Monitors include the Jobs Monitor, the User Connections Monitor, the Database Connections Monitor, the Caches Monitor, the Cubes Monitor, and the Change Journal Monitor. For details on each monitor, see theSystem Administration Guide.

  • Maximum number of transactions retrieved per metadata change journaling search: If you have enabled the change journal feature in MicroStrategy Developer, which logs information about every transaction that occurs in MicroStrategy Developer, you can limit the number of transactions displayed on the right side of MicroStrategy Developer when you view the change journal log. To view transactions logged by the change journal feature,in the Folder List on the left expandAdministration, expandSystemMonitors, then selectChange Journal Transactions. Another way to control the display of change journal entries is to configure a change journal search to filter all change journal entries, when you right-clickChange Journaland selectSearch. For details on change journaling, see the System Administration Help.

  • Display Hidden Objects: Select this check box to display hidden objects. Choosing to display hidden objects is not the same as granting permissions. Like non-hidden objects, hidden objects are created with a set of specified permissions. Therefore, displaying hidden objects does not necessarily mean you have permissions to do anything with the objects if you do not have the proper permissions for them.