Is it possible to get view in RULES

Hi.
Is it possible to get userView in rules.If any one come across this please post piece of code..
Thanks in Advance
Yash

Try something like this:
<br><br>
<set name='user'>
<rule name='checkoutUserView'>
<argument name='accountId' value='$(accountId)' />
</rule>
</set>
<br><br>
<Rule name='checkoutUserView' authType='EndUserRule'>
<RuleArgument name='accountId' />
<block>
<defvar name='viewMaster' />
<set name='viewMaster'>
<new class='com.waveset.session.ViewMaster'>
<invoke name='getLighthouseContext'>
<ref>WF_CONTEXT</ref>
<ref>accountId</ref>
</invoke>
</new>
</set>
<invoke name='setAuthorized'>
<ref>viewMaster</ref>
<invoke name='getBoolean' class='java.lang.Boolean'>
<s>true</s>
</invoke>
</invoke>
<invoke name='checkoutView'>
<ref>viewMaster</ref>
<concat>
<s>User:</s>
<ref>accountId</ref>
</concat>
</invoke>
</block>
<MemberObjectGroups>
<ObjectRef type='ObjectGroup' name='All'/>
</MemberObjectGroups>
</Rule>
<br><br>
In order to access the user object using dot notation you may need to call this piece of code (not sure if necessary if the variable being used is defined in the task definition):
<br><br>
<invoke name='setVariable'>
<ref>WF_CONTEXT</ref>
<s>user</s>
<ref>user</ref>
</invoke>

Similar Messages

  • CREATE MASSIVE CATALOG VIEWS AND RULES

    Dear gurus:
    I have to create about 200 views for a catalog and every one has 5 rules and it takes a long time. Anybody knows if it is possible to create views and rules in a massive way?
    (CCM 240).
    I would appreciate your help.
    Kind Regards,
    SBonilla

    Hi Sandra,
    I have the same requirement. Did you already work out how this could be done. If you have, would be great to hear from you how you did this.
    Thanks
    Cheers

  • Is it possible to easily view the actual (not displayed) value of a cell?

    Is it possible to easily view the actual value of a cell calculated by a formula, not the displayed value after it has been rounded off?
    For instance, if you enter the number 1.23456789 and display it rounded to 3 decimal places, you can still see the full, actual value in the formula bar:
    The problem arises when you reference that number in a formula: you can't see the underlying value (even though it's obviously known to Numbers):
    Is there a way to get the formula bar (or a tooltip) to show the full, unrounded value? Changing the display to more decimal places is not very convenient, especially on big spreadsheets. Maybe it could be done via AppleScript?
    A related issue arises when you try to look at the sum or average of a number: if the numbers being summed have the same number of rounded decimals, the sum displayed is rounded too. I find this very annoying: I want to see the actual value, not how my spreadsheet may be displaying it in that cell.
    Although, curiously, rounding to any number of decimals as long as they are not all the same displays the full, correct underlying values:
    Has anyone come up with workarounds for these issues?

    I did it with an AppleScript.
    Now any time I have a cell or cell range selected, I do one click (AppleScript menu > Display Value at Full Precision), and it shows me a popup alert that simply reads:
         rowname : columnname
         value
    Here's the script:
    tell application "Numbers"
              try
                        set selectedTables to (tables of sheets of front document whose selection range is not missing value)
                        repeat with selectedTable in selectedTables -- tables of each sheet
                                  if contents of selectedTable is not {} then -- the list is not empty, it's the selected sheet
                                            set selectedCells to cells of selection range of (get item 1 of selectedTable)
                                            repeat with i in selectedCells -- each selected cell
                                                      set {selectedRow, selectedColumn, selectedVal} to {row, column, value} of i
      --                                                  display alert "value of " & name of selectedRow & " : " & name of selectedColumn & " (" & address of selectedRow & ":" & address of selectedColumn & ")" message selectedVal
      display alert name of selectedRow & " : " & name of selectedColumn message selectedVal
                                            end repeat
                                            return
                                  end if
                        end repeat
              on error eMsg number eNum
      display alert eMsg
              end try
    end tell
    ( Props to Jacques Rioux who posted code to get me started at https://discussions.apple.com/thread/3964938 )

  • Is it possible to get the position of a charcter from a string ?

    Hi !
    Is it possible to get the position of a charcter from a string ?
    Example:
    @VAR contains the following text "ABCDEFGHIJKLM"
    I'am seaching for FGH, it start on pos. 6 en ends on pos 8.
    How can I get these numbers 6 and 8 ?
    So, I can use them in the MID(text,start,len) function.
    Thanks!

    Hi Sooraj,
    I'll explain more in detail:
    From a web-service I get a variable called @Spec.
    This variable contains the following:
    "MOTORTYPE[CR]D-QW1234[LF]PART[CR]1234-FRD-X[LF]"
    or
    "MOTORTYPE[CR]ABC[LF]PART[CR]E-435[LF]"
    I need the values behind MOTORTYPE[CR] and behind PART[CR]
    But you’ll see that the positions of these values are different each time.
    If there is a way to get the (start) position of "MOTORTYPE[CR]" or "PART[CR]" and the (end) position of the first "[LF]" behind that,
    then I could use the MID() function to get the correct values.
    The values will be displayed in a table view (between other fields).
    An ABAP-call/function won’t work . . . how should I invoke this within a table column/field object ? (system action ?)

  • Is it possible to get a virus on the Mac OS X v10.6.4 Snow Leopard?

    Hi, I was just wondering if it is possible to get viruses on the new system and I was also wondering if someone could give me some help/suggestions on what I should do about a problem I had with my iMac today. When I turned on my computer from sleep today a page popped up onto my iMac computer screen saying I had trojans and viruses on my computer. It also stated I needed to download software in order to fix the problem, luckily while I was in the middle of downloading this software I noticed that the page was not from apple but it was from the internet.. thankfully I cancelled the download just on time and none of the software downloaded... I am new to Mac and I'm now really paranoid that there is viruses on my computer.. should I be worried? What should I do? If anyone has any suggestions/advice/ or help to give to me on iMac computer's -viruses-protecting them etc..I would really appreciate it
    Thanks,
    kateos9

    These 'warnings' are usually pop-unders from a web page you've visited (i.e. they stay behind the page you're viewing so you don't see them until later).
    They claim to have scanned your computer and found viruses: this is complete rubbish and a scam - aimed really at Windows users (the details given are often applicable only to windows).
    You don't have any viruses: there are no Mac viruses in the wild. There are trojans and malware, but in all cases you have to actually install them (usually they try to make you think you are installing something else) and you would have had to give your admin password to do so.
    You were right to stop the download. Never ever download or click any links on anything of this nature. Unless you have specific anti-virus software installed (which would identify itself in any warning) no warning of this nature can be genuine: it's an attempt to get you to install malware, some of which can be very nasty.

  • HT201198 i have 1 year warrenty and my iphone 4 buttons are playing up is it possible to get a replacement from an apple store

    i have 1 year warrenty and my iphone 4 buttons are playing up is it possible to get a replacement from an apple store

    Did you check your security software (firewall)?
    A possible cause is security software (firewall) that blocks or restricts Firefox or the plugin-container process without informing you, possibly after detecting changes (update) to the Firefox program.
    Remove all rules for Firefox from the permissions list in the firewall and let your firewall ask again for permission to get full unrestricted access to internet for Firefox and the plugin-container process and the updater process.
    See:
    * https://support.mozilla.com/kb/Server+not+found

  • Is it possible to get a mac virus?

    Hey,
    I was using a pc and I decided to get a mac, because you can do lots of creative work with it and I was sick of viruses. I was able to clean my pc up after I had a virus and I know how to reprogram it. And I still don't know why I always had a computer virus, because I had a fire wall/anti virus programs and surfed on safe intenet sites.
    Now, after buying a mac book I never feel safe, because I was used to have computer viruses
    Is it possible to get one on my mac?
    (I never download any suspicious stuff from the internet ex.:songs, videos etc I only use my mac for my writing at university, editing pictures and making music)
    Thank you

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Is it possible to get a copy of all purchased music from itunes?

    Hi, My copy of itunes reinstalled itself, so all of my purchased music is now only in the music file. From multiple imports, there are two, three or four copies of most songs in the itunes music library, except for the purchased music, which is only in the Windows music folder. Thought I would delete everything and start over. It would be easier than fixing this mess. I am wondering if it is possible to get a complete purchase history from itunes so that I can save all purchased music before I purge this mess out of my system? Music is taking up 60Gb when it should only be about 15 Gb. Any help would be appreciated.

    You can list your purchase history in your iTunes store account.
    Also you should have a purchased music playlist.
    The other way of doing it is use the "Kind" column. If you don't see it, go to View>>Options and check "Kind"
    Purchased music shows up as "Protected AAC" or for iTunes Plus, "Purchased AAC". You can use Kind to make a smart playlist containing purchased music - if you don't have already have a purchased playlist.
    But be very careful about deleting music files and make sure you have good backups in case you make a mistake. Don't rely on the recycle bin - it doesn't usually have room for large numbers of music files.

  • Is it possible to get message screens of the Office jet 100 without the full package?

    i have a office jet 100 and want to have interaction with my printer (get messages if my cartages empty, no paper, etc), but i don't want to install 800MB of software for a couple of pop-up screens.
    I want to know if it is possible to get the following situation:
    1 : use the enterprise drivers
    2 : use only the interaction features of the Full Feature version.

    Gavin,
    It looks like Mohan already answered your specific question, but I can provide a couple general tips on figuring out what DLLs are being used by your application or which DLLs your application is trying to use that are missing.
    1) The reason Dependency Walker didn't show these problem DLLs in your case is because the DLLs you are missing are probably loaded dynamically at run-time instead of linked statically into your application.
    2) Dependency Walker has a lesser-known "profiling" feature that will track DLL dependencies at run-time and create a log of those dependencies. You could profile your application on the system where it is not working to find out what is missing. You can find details here:
    http://www.dependencywalker.com/help/html/application_profiling.htm
    3) The Process Explorer utility from Microsoft can show you the DLLs loaded (statically and dynamically) by a running process. You could run your application on your development system, view the DLL list in Process Explorer, sort the list by Company Name, and see which National Instruments DLLs are being used by your application. Here is a link to Process Explorer:
    http://technet.microsoft.com/en-us/sysinternals/bb896653
    Hopefully that information will be helpful in the future.
    -Jeff
    National Instruments

  • Is it possible to get component associated with DefaultListSelectionEvent?

    Hallo,
    Is it possible to get component associated with DefaultListSelectionEvent, please?
    There are multiple tables in my window. All tables (must!) have same TableSelectionListener. Problem is that there's no information about component in default list selection model implementation. When fireing events DefaultListSelectionModel use self as event source (see DefaultListSelectionModel.fireValueChanged fragment below).
    e = new ListSelectionEvent(this, firstIndex, lastIndex, isAdjusting);Any ideas how to get component in ListSelectionListener.valueChanged, please? But don't forget that as a programer, i am the lazy. Thus implementing new selection model is not an acceptable solution, but class extension is :p
    One idea is to remember models component in constructor and override DefaultListSelectionModel.fireValueChanged like this:
    class MyGreatListSelectionModel extends DefaultListSelectionModel {
       protected JComponent boss;
        public MyGreatListSelectionModel(JComponent c) {
            boss = c;
        @Override protected void fireValueChanged(int firstIndex, int lastIndex, boolean isAdjusting)
            Object[] listeners = listenerList.getListenerList();
            ListSelectionEvent e = null;
            for (int i = listeners.length - 2; i >= 0; i -= 2) {
                if (listeners[i] == ListSelectionListener.class) {
                    if (e == null) {
                        // Only changed 'this' to 'boss'
                        e = new ListSelectionEvent(boss, firstIndex, lastIndex, isAdjusting);
                    ((ListSelectionListener)listeners[i+1]).valueChanged(e);
    }This should work, but if there already exists some mechanism, such extension is just slowing app down.

    Thanks for your help.
    However I could not get the result. I am using following code:
    public void myaction(ActionEvent event)
    FacesContext context = FacesContext.getCurrentInstance();
    UIViewRoot view = context.getViewRoot();
    UIComponent UI = view.findComponent("tab");
    if(UI == null)     
         System.out.println("UI Not Found ");
    else
         System.out.println("Get Current FecesContext");
    There is an Component having id "tab" is available on JSF page but I am getting "UI not Found" every time. Is there somthing wrong...Please suggest.

  • Is it possible to get MS Office free for mac?

    It is possible to get MS Office free for Mac?

    Not legally. And in all honesty, people take a pretty dim view on this forum of those that want something for nothing. Not judging, just saying.
    If you want a free production suite (similar to Office, that opens .docx and .xlsx files, etc) then take a look at Openoffice, which is an open-source solution.
    https://www.openoffice.org

  • Is it possible to Use Views in place of Queries?

    Lets say that 10 broadcasted reports all could use the same query but each in a different navigational state.
    1. Can you navigate the query and save as a view and then set up a brodacast rule for that view?
    2. Can a DataProvider in a web template be a view?
    3. Can the BI Launcher iView take a view name in place of a query?
    <prt_protcl>://<prt_server>/<bi_launcher>?TEMPLATE=TEST1&QUERY=TEST2
    Is it possible to use Views interchangably with a query name in these situations? If not is there a better way to do this?

    You can goahead with view instead of query as data provider
    You can assign your webtemplates to Iview and assign roles to it

  • IS Possible to get information from GetUserProfileByName inside of repeat section

    IS  Possible to get the values from GetUserProfileByName inside of repeat section? by Codeless
     and then with this result used to filter DDL
    Or GetUserProfileByName  is only useful when it is used for FORM LOAD
    CRISTINA&amp;amp MICROSOFT Forum

    Hi,
    According to your description, my understanding is that you want to use the GetUserProfileByName service in InfoPath form.
    We can get information from GetUserProfileByName inside of repeating section, however you need to give the name of user so that the service can be used to get the details of the user.
    Please refer to the link below:
    http://thinketg.com/using-infopath-and-the-web-service-getuserprofilebyname/
    You can create rules to query for data using GetUserProfileByName, and it is not only useful for form load.
    Thanks,
    Victoria
    Forum Support
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact
    [email protected]
    Victoria Xia
    TechNet Community Support

  • Is it possible to get source code of AutomationManager.as class or/and QTPAdapter.as?

    Sorry, we don’t really provide source for those classes right now.
    On 2/25/09 2:47 AM, "JabbyPanda" <
    [email protected]> wrote:
    A new discussion was started by JabbyPanda in
    General Discussion --
      Is it possible to get source code of  AutomationManager.as class or/and QTPAdapter.as?
    I have a license of Flex Builder 3.0.1 Pro, running Win XP.
    Inside "c:\Program Files\Adobe\Flex Builder 3 Plug-in\sdks\2.0.1\frameworks\source\mx\automation\"  folder I can only locate a listing of source code of IAutomationManager interface.
    Inside "c:\Program Files\Adobe\Flex Builder 3 Plug-in\sdks\3.2.0\frameworks\projects\automation\src\mx\automation\" folder there is also a bunch of open sourced classes present, but even source code of IAutomationManager interface is missing.
    And source code for AutomationManager.as and QTPAdapter.as classes are nowhere to find.
    And I tried to extract source files from Data Visualization package as suggested here
    http://blogs.adobe.com/flexdoc/2008/04/extracting_data_visualization.html, no luck
    View/reply at Is it possible to get source code of  AutomationManager.as class or/and QTPAdapter.as? <
    http://www.adobeforums.com/webx?13@@.59b80b91>
    Replies by email are OK.
    Use the unsubscribe <
    http://www.adobeforums.com/webx?280@@.59b80b91!folder=.3c060fa1>  form to cancel your email subscription.

    We can look at setting up some subtopic forums targeting specifics like automation once we have our new system in place.
    On 2/26/09 7:57 AM, "JabbyPanda" <
    [email protected]> wrote:
    A new message was posted by JabbyPanda in
    General Discussion --
      Is it possible to get source code of AutomationManager.as class or/and QTPAdapter.as?
    What I plan to do, is to write a couple of delegates to prepare (instrument) my custom components that extend from UIComponent for testing.
    I found the source file for AQAdapter.as from FlexMonkey tool at  
    http://code.google.com/p/flexmonkey/source/browse/trunk/FlexMonkey/src/com/gorillalogic/aq adaptor/AQAdapter.as, by studying the code of AQAdapter.as I can get the better idea what QTPAdapter.as does.
    In general, I found the documentation on test automation for Flex application to be very modest and limited, for example many attributes for XML-based "class information file" for HP QuickTest tool are not documented at Adobe Flex livedocs.
    BTW, is there any better place where test professionals and Adobe Flex developers exchange the knowledge on test automation of Flex apps?
    I've tried
    http://www.sqaforums.com by running search query
    http://www.google.com/custom?domains=SQAforums.com&! q=Adobe+Flex&sitesearch=SQAforums.com <
    http://www.google.com/custom?domains=SQAforums.com&q=Adobe+Flex&sitesearch=SQAforums.com> , but I left with a feeling the most enquiries were made by people who are just evaluating possiblity of testing of Flex apps with HP QuickTest tool.  

  • Is it possible to copy the SoD rules in the same system to diff. Rule SetId

    Hi all,
    We have created SoD rules as per our business requirement in RAR 5.3 Component connecting to the QA system. We want to copy the same rules into another different RULE SET for the same QA system. Is this possible?
    Ex: ABRULE SET - Tailored as per Business Requirement and generated rules linking to QA system [Manually configured the SoD rules].We will use this Rule set for our Production System as it was frozen as per the Business Requirement (This we will do by establishing another JCO to production system)
    We wanted to copy the entire SoD rules of ABRULESET to another rule set say YZRULESET. This YZRULESET we will use for making any configuration changes in future before making changes to ABRULESET which will be connected to Production System.
    Is it possible to copy the SoD RULES from one Rule Set ID to another Rule Set ID within the same system? If yes, please provide us the procedure on how to copy the rules of one Rule set Id to another Rule set ID.
    We explored the options of Export & Import Rules but no where it asked for new Rule Set ID for copying.
    Thanks and Best Regards,
    Srihari.K

    Here is a method I've seen a few customers use, which seems like a good idea:
    - load the standard rule set
    - create a new empty rule set
    - create your risks in the new rule set ( initially this could be a re-import of the risks, risk_desc and risk_ruleset files with a few changes done in excel to change the IDs)
    This means you have an exact copy of the SAP standard risks in your own rule set, using the SAP functions.
    Even if you have to define your own risks, there's an enormous value in the functions. The identification of TCodes and objects that do similar business transactions is probably the most difficult thing to reproduce on your own.
    Now, whenever you have to change a risk (risk level, description, owner) you do that in your own name space
    If you have to change a function (modify objects, add custom TCodes), you COPY the function to your own name space and change the risk in your name space to use the changed function.
    If you want to be smart, you do all your own stuff in copies of the text files that come with the support packs (i.e. not in rule architect). That may not be an option if your compliance requirements want you to use the change history or automatic workflows that RAR provides, but if you don't need that, here's the advantage of this:
    When a new set of rules arrives every few months, you delete your rules with a deletion script you can get from SAP support, upload the standard rule text files, upload your own text files, and you're set with your own rule set that makes use of SAP's latest updated functions.
    This is (currently) basically the only way to automatically apply SAP changes without doing it manually, thus leveraging changes to functions by SAP.
    All your changes will be in your own text files, which you can document and version control according to your requirements.
    Not exactly the way according to the manual, but an interesting concept worth considering.

Maybe you are looking for