The Schema Inspector is supplied with JADE, to enable you to inspect database objects in your production JADE systems.
The Schema Inspector icon is installed in your JADE program folder when you install JADE.
A security filter method enables you to define security to specify users who can inspect class instances in a deployed (run time) database. For details, see "
At run time, no instances can be inspected if you do not implement the security filter method to return true in a deployed system. This ensures that any user of the Schema Inspector in a deployed application can inspect only those classes to which access has been specifically permitted by the application software developer.
The following is an example of the command line required to run the Schema Inspector.
jade.exe path=s:\jade\system ini=c:\jade\system\jade.ini schema=JadeMonitorSchema app=JadeSchemaInspector
To execute the deployed Schema Inspector
Click the Schema Inspector icon in the JADE program folder, to run the standalone Schema Inspector application.
The Schema Inspector sign-on form is then displayed. The user id of your workstation is displayed in the User Id text box, by default.
As your password is hidden for security reasons, each character is represented by an asterisk (*) character.
The user id and password are case-sensitive.
Specify your user id and optionally your password in the appropriate text boxes, and then click the OK button to sign on to the Schema Inspector.
The Schema Inspector dialog, shown in the following image, is then displayed.
In the Select Schema to inspect combo box, select the schema whose instances you want to inspect. The classes list box is then populated with all classes in the selected schema.
In this list box, select the classes whose instances you want to inspect.
As the classes list box is a multiple-selection list box, you can use the Shift or Ctrl key to select a group or range of classes.
When you have selected the required classes, click the OK button. If security is not set, the Schema Inspector is then displayed. Alternatively, click the Cancel button to abandon your selections.
If security is set for a selected class and you do not have sufficient security, a message box is displayed, informing you that you do not have sufficient security to inspect instances of the specified class.
Perform one of the following actions.
Select another class to which you may have inspection access rights.
Select the Logoff command from the File menu to display the Schema Inspector sign-on form and specify a user id and password that permit access to the classes whose instances you want to inspect.
Select the Exit command from the File menu, to close the Schema Inspector.
When any security filter requirements have been satisfied, the Schema Inspector form is then displayed. For details about inspecting class instances, see "Using the Schema Inspector Form", later in this document.