Overview

The Schema Inspector is supplied with JADE, to enable you to inspect database objects in your production JADE systems.

The Schema Inspector icon is installed in your JADE program folder when you install JADE.

A security filter method enables you to define security to specify users who can inspect class instances in a deployed (run time) database. For details, see "Deployed JADE Database Inspection Security", in Chapter 3 of the JADE Object Manager Guide.

At run time, instances cannot be inspected if either of (or both) the _jadeapp and _jadedef database files has been marked offline and the security filter method has not been reimplemented or it does not return true. This ensures that any user of the Schema Inspector in a deployed application can inspect only those classes to which access has been specifically permitted by the application software developer.

The following is an example of the command line required to run the Schema Inspector.

jade.exe path=s:\jade\system ini=c:\jade\system\jade.ini schema=JadeMonitorSchema app=JadeSchemaInspector

To execute the deployed Schema Inspector

  1. Click the Schema Inspector icon in the JADE program folder, to run the standalone Schema Inspector application.

    The Schema Inspector sign-on form is then displayed. The user id of your workstation is displayed in the User Id text box, by default.

    As your password is hidden for security reasons, each character is represented by an asterisk (*) character.

    The user id and password are case-sensitive.

  2. Specify your user id and optionally your password in the appropriate text boxes, and then click the OK button to sign on to the Schema Inspector.

    The Schema Inspector dialog, shown in the following image, is then displayed.

  3. In the Select Schema to inspect combo box, select the schema whose instances you want to inspect. The classes list box is then populated with all classes in the selected schema.

  4. In this list box, select the classes whose instances you want to inspect.

    As the classes list box is a multiple-selection list box, you can use the Shift or Ctrl key to select a group or range of classes.

  5. When you have selected the required classes, click the OK button. Alternatively, double‑click an entry to view instances of that class. If security is not set, the Schema Inspector is then displayed. Alternatively, click the Cancel button to abandon your selections.

  6. If security is set for a selected class and you do not have sufficient security, a message box is displayed, informing you that you do not have sufficient security to inspect instances of the specified class.

    Perform one of the following actions.

    • Select another class to which you may have inspection access rights.

    • Select the Logoff command from the File menu to display the Schema Inspector sign-on form and specify a user id and password that permit access to the classes whose instances you want to inspect.

    • Select the Exit command from the File menu, to close the Schema Inspector.

When any security filter requirements have been satisfied, the Schema Inspector form is then displayed. For details about inspecting class instances, see "Using the Schema Inspector Form", later in this document.