From 652c6181475b0c61691cf8f91de75f93c0fdf8b2 Mon Sep 17 00:00:00 2001
From: Simon Leipold <s.leipold@adito.de>
Date: Tue, 21 May 2019 13:57:17 +0200
Subject: [PATCH] =?UTF-8?q?1036804=20Berechtigung=20-=20Entit=C3=A4ts?=
 =?UTF-8?q?=C3=BCbersicht=20-=20updated=20db-structure=20and=20bug=20fixes?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

---
 .../basic/2019.2/create_asys_permission.xml   |  20 +--
 .../2019.2/create_asys_permissionaction.xml   |  18 +--
 .../2019.2/create_asys_permissionset.xml      |  24 ++--
 .../PermissionAction_entity.aod               |   8 +-
 .../recordcontainers/db/conditionProcess.js   |   2 +-
 .../PermissionDetail_entity.aod               |   5 +
 .../condtype/displayValueProcess.js           |   2 +-
 .../containername_param/valueProcess.js       |   2 +-
 .../recordcontainers/jdito/contentProcess.js  |  17 +--
 .../recordcontainers/jdito/onDelete.js        |  24 ++--
 .../recordcontainers/jdito/onInsert.js        |  15 +-
 .../recordcontainers/jdito/onUpdate.js        |  13 +-
 .../PermissionMetaData_entity.aod             |   3 +-
 .../PermissionOverview_entity.aod             |   2 +-
 .../recordcontainers/jdito/contentProcess.js  |   4 +-
 .../PermissionSet_entity.aod                  |   8 +-
 .../Permission_entity/Permission_entity.aod   |   8 +-
 .../recordcontainers/db/conditionProcess.js   |   2 +-
 entity/Role_entity/Role_entity.aod            |   3 +-
 .../PermissionDetailFilter_view.aod           |   2 +-
 .../PermissionDetailPreview_view.aod          |   2 +-
 process/Permission_lib/process.js             | 130 +++++++++---------
 22 files changed, 157 insertions(+), 157 deletions(-)

diff --git a/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permission.xml b/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permission.xml
index 1a6bc58ae9e..66b4bfee09b 100644
--- a/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permission.xml
+++ b/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permission.xml
@@ -1,13 +1,13 @@
 <?xml version="1.1" encoding="UTF-8" standalone="no"?>
 <databaseChangeLog xmlns="http://www.liquibase.org/xml/ns/dbchangelog" xmlns:ext="http://www.liquibase.org/xml/ns/dbchangelog-ext" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.liquibase.org/xml/ns/dbchangelog-ext http://www.liquibase.org/xml/ns/dbchangelog/dbchangelog-ext.xsd http://www.liquibase.org/xml/ns/dbchangelog http://www.liquibase.org/xml/ns/dbchangelog/dbchangelog-3.6.xsd">
-<changeSet author="s.leipold" id="10e8ed3e-7f75-400b-bc21-6fc3db778296">
-    <createTable tableName="ASYS_PERMISSION">
-        <column name="PERMISSIONID" type="CHAR(36)">
-            <constraints primaryKey="true" primaryKeyName="PK_ASYS_PERMISSION_ID"/>
-        </column>
-        <column name="PERMISSIONSET_ID" type="CHAR(36)"/>
-        <column name="COND" type="VARCHAR(255)"/>
-        <column name="CONDTYPE" type="BOOLEAN"/>
-    </createTable>
-</changeSet>
+    <changeSet author="s.leipold" id="746f6e0c-3eab-4424-867f-4cf4fb4c45bb">
+        <createTable tableName="ASYS_PERMISSION">
+            <column name="ASYS_PERMISSIONID" type="CHAR(36)">
+                <constraints primaryKey="true" primaryKeyName="PK_ASYS_PERMISSION_ID"/>
+            </column>
+            <column name="ASYS_PERMISSIONSET_ID" type="CHAR(36)"/>
+            <column name="COND" type="VARCHAR(255)"/>
+            <column name="CONDTYPE" type="BOOLEAN"/>
+        </createTable>
+    </changeSet>
 </databaseChangeLog>
\ No newline at end of file
diff --git a/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permissionaction.xml b/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permissionaction.xml
index c29101211b2..746ab274026 100644
--- a/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permissionaction.xml
+++ b/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permissionaction.xml
@@ -1,12 +1,12 @@
 <?xml version="1.1" encoding="UTF-8" standalone="no"?>
 <databaseChangeLog xmlns="http://www.liquibase.org/xml/ns/dbchangelog" xmlns:ext="http://www.liquibase.org/xml/ns/dbchangelog-ext" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.liquibase.org/xml/ns/dbchangelog-ext http://www.liquibase.org/xml/ns/dbchangelog/dbchangelog-ext.xsd http://www.liquibase.org/xml/ns/dbchangelog http://www.liquibase.org/xml/ns/dbchangelog/dbchangelog-3.6.xsd">
-<changeSet author="s.leipold" id="7ba7c5f3-2b2b-4161-aa2b-dad3b8df6a57">
-    <createTable tableName="ASYS_PERMISSIONACTION">
-        <column name="PERMISSIONACTIONID" type="CHAR(36)">
-            <constraints primaryKey="true" primaryKeyName="PK_ASYS_PERMISSIONACTION_ID"/>
-        </column>
-        <column name="PERMISSION_ID" type="CHAR(36)"/>
-        <column name="ACTION" type="VARCHAR(255)"/>
-    </createTable>
-</changeSet>
+    <changeSet author="s.leipold" id="20241de4-091e-4093-8055-c87c172e5788">
+        <createTable tableName="ASYS_PERMISSIONACTION">
+            <column name="ASYS_PERMISSIONACTIONID" type="CHAR(36)">
+                <constraints primaryKey="true" primaryKeyName="PK_ASYS_PERMISSIONACTION_ID"/>
+            </column>
+            <column name="ASYS_PERMISSION_ID" type="CHAR(36)"/>
+            <column name="ACTION" type="VARCHAR(255)"/>
+        </createTable>
+    </changeSet>
 </databaseChangeLog>
\ No newline at end of file
diff --git a/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permissionset.xml b/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permissionset.xml
index dcc8faad2f9..31583db7ce1 100644
--- a/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permissionset.xml
+++ b/.liquibase/_____SYSTEMALIAS/basic/2019.2/create_asys_permissionset.xml
@@ -1,15 +1,15 @@
 <?xml version="1.1" encoding="UTF-8" standalone="no"?>
 <databaseChangeLog xmlns="http://www.liquibase.org/xml/ns/dbchangelog" xmlns:ext="http://www.liquibase.org/xml/ns/dbchangelog-ext" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.liquibase.org/xml/ns/dbchangelog-ext http://www.liquibase.org/xml/ns/dbchangelog/dbchangelog-ext.xsd http://www.liquibase.org/xml/ns/dbchangelog http://www.liquibase.org/xml/ns/dbchangelog/dbchangelog-3.6.xsd">
-<changeSet author="s.leipold" id="8a84a4ad-8e29-4bef-b851-980a23a8c58c">
-    <createTable tableName="ASYS_PERMISSIONSET">
-        <column name="PERMISSIONSETID" type="CHAR(36)">
-            <constraints primaryKey="true" primaryKeyName="PK_ASYS_PERMISSIONSET_ID"/>
-        </column>
-        <column name="PERMISSIONSET_ID" type="CHAR(36)"/>
-        <column name="ENTITY_ID" type="VARCHAR(255)"/>
-        <column name="ROLE_ID" type="VARCHAR(255)"/>
-		<column name="FIELD_ID" type="VARCHAR(255)"/>
-		<column name="ACCESSTYPE" type="CHAR(1)"/>
-    </createTable>
-</changeSet>
+    <changeSet author="s.leipold" id="8a125d57-48c6-4d2e-9568-d5e66f72a702">
+        <createTable tableName="ASYS_PERMISSIONSET">
+            <column name="ASYS_PERMISSIONSETID" type="CHAR(36)">
+                <constraints primaryKey="true" primaryKeyName="PK_ASYS_PERMISSIONSET_ID"/>
+            </column>
+            <column name="ASYS_PERMISSIONSET_ID" type="CHAR(36)"/>
+            <column name="ENTITY_ID" type="VARCHAR(255)"/>
+            <column name="ROLE_ID" type="VARCHAR(255)"/>
+            <column name="FIELD_ID" type="VARCHAR(255)"/>
+            <column name="ACCESSTYPE" type="CHAR(1)"/>
+        </createTable>
+    </changeSet>
 </databaseChangeLog>
\ No newline at end of file
diff --git a/entity/PermissionAction_entity/PermissionAction_entity.aod b/entity/PermissionAction_entity/PermissionAction_entity.aod
index 07521d06a95..4ab37a7f094 100644
--- a/entity/PermissionAction_entity/PermissionAction_entity.aod
+++ b/entity/PermissionAction_entity/PermissionAction_entity.aod
@@ -53,13 +53,13 @@
   <recordContainers>
     <dbRecordContainer>
       <name>db</name>
-      <alias>Data_alias</alias>
+      <alias>_____SYSTEMALIAS</alias>
       <conditionProcess>%aditoprj%/entity/PermissionAction_entity/recordcontainers/db/conditionProcess.js</conditionProcess>
       <linkInformation>
         <linkInformation>
-          <name>164b4d98-4458-40ed-8fa9-f29aef333372</name>
-          <tableName>AB_PERMISSIONACTION</tableName>
-          <primaryKey>AB_PERMISSIONACTIONID</primaryKey>
+          <name>f73c027f-55f0-4f43-8520-8bd7b4bcbf81</name>
+          <tableName>ASYS_PERMISSIONACTION</tableName>
+          <primaryKey>PERMISSIONACTIONID</primaryKey>
           <isUIDTable v="false" />
           <readonly v="false" />
         </linkInformation>
diff --git a/entity/PermissionAction_entity/recordcontainers/db/conditionProcess.js b/entity/PermissionAction_entity/recordcontainers/db/conditionProcess.js
index d858d1cb48b..10aaf65ee4b 100644
--- a/entity/PermissionAction_entity/recordcontainers/db/conditionProcess.js
+++ b/entity/PermissionAction_entity/recordcontainers/db/conditionProcess.js
@@ -3,4 +3,4 @@ import("system.db");
 import("system.result");
 
 if (vars.get("$param.PermissionId_param"))
-    result.string(db.translateCondition("AB_PERMISSION_ID = '" + vars.get("$param.PermissionId_param") + "'"));
\ No newline at end of file
+    result.string(db.translateCondition("ASYS_PERMISSION_ID = '" + vars.get("$param.PermissionId_param") + "'"));
\ No newline at end of file
diff --git a/entity/PermissionDetail_entity/PermissionDetail_entity.aod b/entity/PermissionDetail_entity/PermissionDetail_entity.aod
index 0691776bc29..f0a82c5aa6b 100644
--- a/entity/PermissionDetail_entity/PermissionDetail_entity.aod
+++ b/entity/PermissionDetail_entity/PermissionDetail_entity.aod
@@ -17,6 +17,7 @@
     <entityField>
       <name>ACTION</name>
       <title>Action</title>
+      <mandatory v="true" />
       <searchable v="false" />
     </entityField>
     <entityField>
@@ -24,6 +25,7 @@
       <title>Role</title>
       <consumer>Roles</consumer>
       <linkedContext>Role</linkedContext>
+      <mandatory v="true" />
       <groupable v="true" />
       <valueProcess>%aditoprj%/entity/PermissionDetail_entity/entityfields/role/valueProcess.js</valueProcess>
     </entityField>
@@ -32,6 +34,7 @@
       <title>Entity</title>
       <consumer>MetaData</consumer>
       <linkedContext>PermissionMetaData</linkedContext>
+      <mandatory v="true" />
       <groupable v="true" />
       <valueProcess>%aditoprj%/entity/PermissionDetail_entity/entityfields/entity/valueProcess.js</valueProcess>
     </entityField>
@@ -51,12 +54,14 @@
       <name>ACCESSTYPE</name>
       <title>Access type</title>
       <consumer>KeywordAccessType</consumer>
+      <mandatory v="true" />
       <groupable v="true" />
     </entityField>
     <entityField>
       <name>CONDTYPE</name>
       <title>Condition Type</title>
       <consumer>KeywordConditionType</consumer>
+      <mandatory v="true" />
       <displayValueProcess>%aditoprj%/entity/PermissionDetail_entity/entityfields/condtype/displayValueProcess.js</displayValueProcess>
     </entityField>
     <entityField>
diff --git a/entity/PermissionDetail_entity/entityfields/condtype/displayValueProcess.js b/entity/PermissionDetail_entity/entityfields/condtype/displayValueProcess.js
index 8d0ed5002ab..40f4ec0027f 100644
--- a/entity/PermissionDetail_entity/entityfields/condtype/displayValueProcess.js
+++ b/entity/PermissionDetail_entity/entityfields/condtype/displayValueProcess.js
@@ -3,4 +3,4 @@ import("system.vars");
 import("Keyword_lib");
 import("KeywordRegistry_basic");
 
-//result.string(KeywordUtils.getViewValue($KeywordRegistry.permissionConditionType(), vars.get("$field.CONDTYPE")));
+result.string(KeywordUtils.getViewValue($KeywordRegistry.permissionCondType(), vars.get("$field.CONDTYPE")));
diff --git a/entity/PermissionDetail_entity/entityfields/keywordconditiontype/children/containername_param/valueProcess.js b/entity/PermissionDetail_entity/entityfields/keywordconditiontype/children/containername_param/valueProcess.js
index 206253174b1..2f9426da9a4 100644
--- a/entity/PermissionDetail_entity/entityfields/keywordconditiontype/children/containername_param/valueProcess.js
+++ b/entity/PermissionDetail_entity/entityfields/keywordconditiontype/children/containername_param/valueProcess.js
@@ -2,4 +2,4 @@ import("system.result");
 import("Keyword_lib");
 import("KeywordRegistry_basic");
 
-result.string($KeywordRegistry.permissionConditionType());
+result.string($KeywordRegistry.permissionCondType());
diff --git a/entity/PermissionDetail_entity/recordcontainers/jdito/contentProcess.js b/entity/PermissionDetail_entity/recordcontainers/jdito/contentProcess.js
index a51aa5d5700..8d45a3c3c78 100644
--- a/entity/PermissionDetail_entity/recordcontainers/jdito/contentProcess.js
+++ b/entity/PermissionDetail_entity/recordcontainers/jdito/contentProcess.js
@@ -7,22 +7,23 @@ import("Permission_lib");
 var selectedPermission = vars.get("$local.idvalues");
 var sqlStr;
 var whereCond = "";
+var alias = "_____SYSTEMALIAS";
 
 if (vars.exists("$param.RoleTitle_param") && vars.get("$param.RoleTitle_param")) {
-    whereCond = " where AB_PERMISSIONSET.ROLE_ID = '" + vars.getString("$param.RoleTitle_param") + "'";
+    whereCond = " where ASYS_PERMISSIONSET.ROLE_ID = '" + vars.getString("$param.RoleTitle_param") + "'";
 } else if (vars.exists("$param.EntityTitle_param") && vars.get("$param.EntityTitle_param")) {
-    whereCond = " where AB_PERMISSIONSET.ENTITY_ID = '" + vars.getString("$param.EntityTitle_param") + "'";
+    whereCond = " where ASYS_PERMISSIONSET.ENTITY_ID = '" + vars.getString("$param.EntityTitle_param") + "'";
 }
 
 sqlStr = 
-    "select AB_PERMISSION.AB_PERMISSIONID, AB_PERMISSIONSET.ENTITY_ID, AB_PERMISSIONSET.ROLE_ID,"
-    + " AB_PERMISSIONSET.FIELD_ID, AB_PERMISSION.COND, AB_PERMISSIONACTION.ACTION, AB_PERMISSIONSET.ACCESSTYPE, AB_PERMISSION.CONDTYPE from AB_PERMISSIONSET"
-    + " join AB_PERMISSION on AB_PERMISSION.AB_PERMISSIONSET_ID = AB_PERMISSIONSET.AB_PERMISSIONSETID"
-    + " join AB_PERMISSIONACTION on AB_PERMISSIONACTION.AB_PERMISSION_ID = AB_PERMISSION.AB_PERMISSIONID"
+    "select ASYS_PERMISSION.ASYS_PERMISSIONID, ASYS_PERMISSIONSET.ENTITY_ID, ASYS_PERMISSIONSET.ROLE_ID,"
+    + " ASYS_PERMISSIONSET.FIELD_ID, ASYS_PERMISSION.COND, ASYS_PERMISSIONACTION.ACTION, ASYS_PERMISSIONSET.ACCESSTYPE, ASYS_PERMISSION.CONDTYPE from ASYS_PERMISSIONSET"
+    + " join ASYS_PERMISSION on ASYS_PERMISSION.ASYS_PERMISSIONSET_ID = ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID"
+    + " join ASYS_PERMISSIONACTION on ASYS_PERMISSIONACTION.ASYS_PERMISSION_ID = ASYS_PERMISSION.ASYS_PERMISSIONID"
     + whereCond
-    + " order by AB_PERMISSION.AB_PERMISSIONID";
+    + " order by ASYS_PERMISSION.ASYS_PERMISSIONID";
 
-var sqlRes = db.table(sqlStr);
+var sqlRes = db.table(sqlStr, alias);
 var permissionTable = PermissionUtil.convertArrToObj(sqlRes);
 
 // group all permissions by permissionid and condition, concat actions
diff --git a/entity/PermissionDetail_entity/recordcontainers/jdito/onDelete.js b/entity/PermissionDetail_entity/recordcontainers/jdito/onDelete.js
index 59f34513d50..adbb5889dfb 100644
--- a/entity/PermissionDetail_entity/recordcontainers/jdito/onDelete.js
+++ b/entity/PermissionDetail_entity/recordcontainers/jdito/onDelete.js
@@ -8,13 +8,13 @@ var parentPermSetId = PermissionUtil.getParentPermissionSet(permId);
 var linkedActions = PermissionUtil.getAllChildPermissionActions(permId);
 
 var sqlCondDelAction = SqlCondition.begin()
-.and("AB_PERMISSIONACTION.AB_PERMISSIONACTIONID in ('" + linkedActions.join("','") + "')")
+.and("ASYS_PERMISSIONACTION.ASYS_PERMISSIONACTIONID in ('" + linkedActions.join("','") + "')")
 .build();
 var sqlCondDelPerm = SqlCondition.begin()
-.and("AB_PERMISSION.AB_PERMISSIONID = '" + permId + "'")
+.and("ASYS_PERMISSION.ASYS_PERMISSIONID = '" + permId + "'")
 .build();
 var sqlCondDelPermSet = SqlCondition.begin()
-.and("AB_PERMISSIONSET.AB_PERMISSIONSETID = '" + parentPermSetId + "'")
+.and("ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID = '" + parentPermSetId + "'")
 .build();
 
 switch (accessType) {
@@ -25,25 +25,25 @@ switch (accessType) {
         var allPermActions = PermissionUtil.getAllPermissionActions(allPerms);
         
         sqlCondDelAction = SqlCondition.begin()
-        .and("AB_PERMISSIONACTION.AB_PERMISSIONACTIONID in ('" + allPermActions.join("','") + "')")
+        .and("ASYS_PERMISSIONACTION.ASYS_PERMISSIONACTIONID in ('" + allPermActions.join("','") + "')")
         .build();
         sqlCondDelPerm = SqlCondition.begin()
-        .and("AB_PERMISSION.AB_PERMISSIONID in ('" + allPerms.join("','") + "')")
+        .and("ASYS_PERMISSION.ASYS_PERMISSIONID in ('" + allPerms.join("','") + "')")
         .build();
         sqlCondDelPermSet = SqlCondition.begin()
-        .and("AB_PERMISSIONSET.AB_PERMISSIONSETID in ('" + allPermSets.join("','") + "')")
+        .and("ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID in ('" + allPermSets.join("','") + "')")
         .build();
         
-        db.deleteData("AB_PERMISSIONACTION", sqlCondDelAction); // delete all actions
-        db.deleteData("AB_PERMISSION", sqlCondDelPerm); // delete all permissions
-        db.deleteData("AB_PERMISSIONSET", sqlCondDelPermSet); // delete all permission sets
+        db.deleteData("ASYS_PERMISSIONACTION", sqlCondDelAction); // delete all actions
+        db.deleteData("ASYS_PERMISSION", sqlCondDelPerm); // delete all permissions
+        db.deleteData("ASYS_PERMISSIONSET", sqlCondDelPermSet); // delete all permission sets
         break;
     default:
-        db.deleteData("AB_PERMISSIONACTION", sqlCondDelAction); // delete all actions of the selected permission
-        db.deleteData("AB_PERMISSION", sqlCondDelPerm); // delete the selected permission
+        db.deleteData("ASYS_PERMISSIONACTION", sqlCondDelAction); // delete all actions of the selected permission
+        db.deleteData("ASYS_PERMISSION", sqlCondDelPerm); // delete the selected permission
         break;
 }
 
 if (PermissionUtil.permSetIsEmpty(parentPermSetId)) {
-    db.deleteData("AB_PERMISSIONSET", sqlCondDelPermSet); // delete empty permissionset
+    db.deleteData("ASYS_PERMISSIONSET", sqlCondDelPermSet); // delete empty permissionset
 }
diff --git a/entity/PermissionDetail_entity/recordcontainers/jdito/onInsert.js b/entity/PermissionDetail_entity/recordcontainers/jdito/onInsert.js
index 72d8888bbd4..09f7f0299b4 100644
--- a/entity/PermissionDetail_entity/recordcontainers/jdito/onInsert.js
+++ b/entity/PermissionDetail_entity/recordcontainers/jdito/onInsert.js
@@ -5,8 +5,6 @@ import("system.db");
 import("system.vars");
 import("Permission_lib");
 
-logging.log("---INSERT---");
-
 var table, cols, vals;
 var sqlExt = "";
 var permissionid = util.getNewUUID();
@@ -19,9 +17,6 @@ var condition = vars.get("$field.CONDITION");
 var action = vars.get("$field.ACTION");
 
 if (checkInput([role, entity, accesstype, condtype, action])) {
-    // calculate accesstype
-    // TODO: calculation of accesstype not needed
-    // $field.ACCESSTYPE should only allow input according to inserted field (->F) or action (view,create) (->E) otherwise (->R)
     if (checkInput([field]))
         sqlExt += " and FIELD_ID = '" + field + "'";
     else if (action.includes("view") || action.includes("create"))
@@ -29,9 +24,9 @@ if (checkInput([role, entity, accesstype, condtype, action])) {
     else 
         sqlExt += " and ACCESSTYPE = 'R'";
 
-    var sqlStr = "select AB_PERMISSIONSETID from AB_PERMISSIONSET where ENTITY_ID = '" + entity + "' and ROLE_ID = '" + role + "'" + sqlExt;
+    var sqlStr = "select ASYS_PERMISSIONSETID from ASYS_PERMISSIONSET where ENTITY_ID = '" + entity + "' and ROLE_ID = '" + role + "'" + sqlExt;
     var permissionsetid = db.cell(sqlStr);
-
+    
     if (permissionsetid == "") {
         // no fitting permissionset found - insert new permissionset
         var rootpermissionset;
@@ -45,7 +40,6 @@ if (checkInput([role, entity, accesstype, condtype, action])) {
 
     // check if a new permissions is needed or an existing one can be used
     var existingPermId = permExists(role, entity, field, accesstype, condtype, condition);
-    logging.log(existingPermId);
     if (existingPermId != "") {
         // update
         permissionid = existingPermId;
@@ -57,7 +51,6 @@ if (checkInput([role, entity, accesstype, condtype, action])) {
     
     // insert new permissionaction    
     var actionNew = action.split(",");
-    logging.log("action new: " + actionNew.toSource());
     for each (let permaction in actionNew) {
         PermissionUtil.insertNewPermissionAction(permissionid, permaction);
     }
@@ -79,8 +72,8 @@ function permExists(pRole, pEntity, pField, pAccesstype, pCondtype, pCondition)
         sqlExt += " and COND = '" + pCondition + "'";
     if (pField != null && pField != undefined && pField != "")
         sqlExt += " and FIELD_ID = '" + pField + "'";
-    var sqlStr = "select AB_PERMISSION.AB_PERMISSIONID from AB_PERMISSIONSET"
-    + " join AB_PERMISSION on AB_PERMISSION.AB_PERMISSIONSET_ID = AB_PERMISSIONSET.AB_PERMISSIONSETID"
+    var sqlStr = "select ASYS_PERMISSION.ASYS_PERMISSIONID from ASYS_PERMISSIONSET"
+    + " join ASYS_PERMISSION on ASYS_PERMISSION.ASYS_PERMISSIONSET_ID = ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID"
     + " where ENTITY_ID = '" + pEntity + "' and ROLE_ID = '" + pRole + "'"
     + " and ACCESSTYPE = '" + pAccesstype + "' and CONDTYPE = '" + pCondtype + "'" + sqlExt;
     var permId = db.cell(sqlStr);
diff --git a/entity/PermissionDetail_entity/recordcontainers/jdito/onUpdate.js b/entity/PermissionDetail_entity/recordcontainers/jdito/onUpdate.js
index 3bf18cf748a..0be080b8021 100644
--- a/entity/PermissionDetail_entity/recordcontainers/jdito/onUpdate.js
+++ b/entity/PermissionDetail_entity/recordcontainers/jdito/onUpdate.js
@@ -4,12 +4,9 @@ import("system.db");
 import("system.vars");
 import("Permission_lib");
 
-logging.log("---UPDATE---");
-
 var table, cols, vals, cond;
 
 var permissionid = vars.get("$field.UID");
-logging.log("permissionid: " + permissionid);
 var actionNew = vars.get("$field.ACTION").split(",");
 var entityNew = vars.get("$field.ENTITY");
 var permCond = vars.get("$field.CONDITION");
@@ -18,8 +15,8 @@ var diff = PermissionUtil.getActionDiff(permissionid, actionNew);
 
 if (diff.length > 0) {
     // delete all linked permission actions
-    table = "AB_PERMISSIONACTION";
-    cond = SqlCondition.begin().and("AB_PERMISSION_ID = '" + permissionid + "'").build();
+    table = "ASYS_PERMISSIONACTION";
+    cond = SqlCondition.begin().and("ASYS_PERMISSION_ID = '" + permissionid + "'").build();
     var dbDeletes = db.deleteData(table, cond);
     
     // insert the different actions
@@ -29,7 +26,7 @@ if (diff.length > 0) {
     }
 }
 
-PermissionUtil.updateIfDiff(permissionid, permCond, "COND", "AB_PERMISSION"); // updates COND if the new cond is different to COND in DB
-PermissionUtil.updateIfDiff(permissionid, permCondType, "CONDTYPE", "AB_PERMISSION"); // updates CONDTYPE if the new condtype is different to CONDTYPE in DB
+PermissionUtil.updateIfDiff(permissionid, permCond, "COND", "ASYS_PERMISSION"); // updates COND if the new cond is different to COND in DB
+PermissionUtil.updateIfDiff(permissionid, permCondType, "CONDTYPE", "ASYS_PERMISSION"); // updates CONDTYPE if the new condtype is different to CONDTYPE in DB
 // entity of children has to be changed/deleted/ignored?
-// PermissionUtil.updateIfDiff(PermissionUtil.getParentPermissionSet(permissionid), entityNew, "ENTITY_ID", "AB_PERMISSIONSET");
+// PermissionUtil.updateIfDiff(PermissionUtil.getParentPermissionSet(permissionid), entityNew, "ENTITY_ID", "ASYS_PERMISSIONSET");
diff --git a/entity/PermissionMetaData_entity/PermissionMetaData_entity.aod b/entity/PermissionMetaData_entity/PermissionMetaData_entity.aod
index b08bb2b6f9c..afcc9c6047f 100644
--- a/entity/PermissionMetaData_entity/PermissionMetaData_entity.aod
+++ b/entity/PermissionMetaData_entity/PermissionMetaData_entity.aod
@@ -81,8 +81,9 @@
   <recordContainers>
     <jDitoRecordContainer>
       <name>jDito</name>
-      <jDitoRecordAlias>Data_alias</jDitoRecordAlias>
+      <jDitoRecordAlias>_____SYSTEMALIAS</jDitoRecordAlias>
       <isPageable v="false" />
+      <isFilterable v="true" />
       <contentProcess>%aditoprj%/entity/PermissionMetaData_entity/recordcontainers/jdito/contentProcess.js</contentProcess>
       <recordFields>
         <element>UID.value</element>
diff --git a/entity/PermissionOverview_entity/PermissionOverview_entity.aod b/entity/PermissionOverview_entity/PermissionOverview_entity.aod
index a3fced035b6..49d95285d5a 100644
--- a/entity/PermissionOverview_entity/PermissionOverview_entity.aod
+++ b/entity/PermissionOverview_entity/PermissionOverview_entity.aod
@@ -78,7 +78,7 @@
   <recordContainers>
     <jDitoRecordContainer>
       <name>jDito</name>
-      <jDitoRecordAlias>Data_alias</jDitoRecordAlias>
+      <jDitoRecordAlias>_____SYSTEMALIAS</jDitoRecordAlias>
       <contentProcess>%aditoprj%/entity/PermissionOverview_entity/recordcontainers/jdito/contentProcess.js</contentProcess>
       <recordFields>
         <element>UID.value</element>
diff --git a/entity/PermissionOverview_entity/recordcontainers/jdito/contentProcess.js b/entity/PermissionOverview_entity/recordcontainers/jdito/contentProcess.js
index a9d0a7060ae..577562c79ec 100644
--- a/entity/PermissionOverview_entity/recordcontainers/jdito/contentProcess.js
+++ b/entity/PermissionOverview_entity/recordcontainers/jdito/contentProcess.js
@@ -12,11 +12,11 @@ var sqlStr = "";
 if (vars.exists("$param.RoleTitle_param") && vars.get("$param.RoleTitle_param")) {
     roleTitle = vars.getString("$param.RoleTitle_param");
     sqlCond = " where ROLE_ID = '" + roleTitle + "'";
-    sqlStr = "select distinct ENTITY_ID from AB_PERMISSIONSET" + sqlCond;
+    sqlStr = "select distinct ENTITY_ID from ASYS_PERMISSIONSET" + sqlCond;
 } else if (vars.exists("$param.EntityTitle_param") && vars.get("$param.EntityTitle_param")) {
     entityTitle = vars.getString("$param.EntityTitle_param");
     sqlCond = " where ENTITY_ID = '" + entityTitle + "'";
-    sqlStr = "select distinct ROLE_ID from AB_PERMISSIONSET" + sqlCond;
+    sqlStr = "select distinct ROLE_ID from ASYS_PERMISSIONSET" + sqlCond;
 }
 
 var rolesOrEntities = db.array(db.COLUMN, sqlStr);
diff --git a/entity/PermissionSet_entity/PermissionSet_entity.aod b/entity/PermissionSet_entity/PermissionSet_entity.aod
index cd1ac606d77..e248b5b557c 100644
--- a/entity/PermissionSet_entity/PermissionSet_entity.aod
+++ b/entity/PermissionSet_entity/PermissionSet_entity.aod
@@ -66,12 +66,12 @@
   <recordContainers>
     <dbRecordContainer>
       <name>db</name>
-      <alias>Data_alias</alias>
+      <alias>_____SYSTEMALIAS</alias>
       <linkInformation>
         <linkInformation>
-          <name>a9991ed6-0f6a-4da3-b54c-0b1a3c9cf885</name>
-          <tableName>AB_PERMISSIONSET</tableName>
-          <primaryKey>AB_PERMISSIONSETID</primaryKey>
+          <name>85886d1e-c26d-48ac-93fc-ff06c24ba8a3</name>
+          <tableName>ASYS_PERMISSIONSET</tableName>
+          <primaryKey>PERMISSIONSETID</primaryKey>
           <isUIDTable v="false" />
           <readonly v="false" />
         </linkInformation>
diff --git a/entity/Permission_entity/Permission_entity.aod b/entity/Permission_entity/Permission_entity.aod
index 4ae5db01e9c..87b91b6d71e 100644
--- a/entity/Permission_entity/Permission_entity.aod
+++ b/entity/Permission_entity/Permission_entity.aod
@@ -66,13 +66,13 @@
   <recordContainers>
     <dbRecordContainer>
       <name>db</name>
-      <alias>Data_alias</alias>
+      <alias>_____SYSTEMALIAS</alias>
       <conditionProcess>%aditoprj%/entity/Permission_entity/recordcontainers/db/conditionProcess.js</conditionProcess>
       <linkInformation>
         <linkInformation>
-          <name>2061cedc-6d6f-4515-9ef8-8af77aba483e</name>
-          <tableName>AB_PERMISSION</tableName>
-          <primaryKey>AB_PERMISSIONID</primaryKey>
+          <name>a2c1ed85-8827-47dc-ad87-cbed33c141e5</name>
+          <tableName>ASYS_PERMISSION</tableName>
+          <primaryKey>PERMISSIONID</primaryKey>
           <isUIDTable v="false" />
           <readonly v="false" />
         </linkInformation>
diff --git a/entity/Permission_entity/recordcontainers/db/conditionProcess.js b/entity/Permission_entity/recordcontainers/db/conditionProcess.js
index e3b2aadeab4..88f496a9fc2 100644
--- a/entity/Permission_entity/recordcontainers/db/conditionProcess.js
+++ b/entity/Permission_entity/recordcontainers/db/conditionProcess.js
@@ -3,4 +3,4 @@ import("system.db");
 import("system.result");
 
 if (vars.exists("$param.PermissionSetId_param") && vars.get("$param.PermissionSetId_param"))
-    result.string(db.translateCondition("AB_PERMISSIONSET_ID = '" + vars.get("$param.PermissionSetId_param") + "'"));
\ No newline at end of file
+    result.string(db.translateCondition("ASYS_PERMISSIONSET_ID = '" + vars.get("$param.PermissionSetId_param") + "'"));
\ No newline at end of file
diff --git a/entity/Role_entity/Role_entity.aod b/entity/Role_entity/Role_entity.aod
index f67054398e2..7361c7c1eb9 100644
--- a/entity/Role_entity/Role_entity.aod
+++ b/entity/Role_entity/Role_entity.aod
@@ -76,7 +76,8 @@
   <recordContainers>
     <jDitoRecordContainer>
       <name>jDito</name>
-      <jDitoRecordAlias>Data_alias</jDitoRecordAlias>
+      <jDitoRecordAlias>_____SYSTEMALIAS</jDitoRecordAlias>
+      <isFilterable v="true" />
       <contentProcess>%aditoprj%/entity/Role_entity/recordcontainers/jdito/contentProcess.js</contentProcess>
       <recordFields>
         <element>UID.value</element>
diff --git a/neonView/PermissionDetailFilter_view/PermissionDetailFilter_view.aod b/neonView/PermissionDetailFilter_view/PermissionDetailFilter_view.aod
index 60abad21e7d..427042b353b 100644
--- a/neonView/PermissionDetailFilter_view/PermissionDetailFilter_view.aod
+++ b/neonView/PermissionDetailFilter_view/PermissionDetailFilter_view.aod
@@ -13,7 +13,7 @@
     <treeViewTemplate>
       <name>Treetable</name>
       <parentField>PARENT</parentField>
-      <titleField>#TITLE</titleField>
+      <titleField>#CONTENTTITLE</titleField>
       <descriptionField>ACTION</descriptionField>
       <iconField>#ICON</iconField>
       <hideContentSearch v="true" />
diff --git a/neonView/PermissionDetailPreview_view/PermissionDetailPreview_view.aod b/neonView/PermissionDetailPreview_view/PermissionDetailPreview_view.aod
index 68df6946fe0..ca1524850be 100644
--- a/neonView/PermissionDetailPreview_view/PermissionDetailPreview_view.aod
+++ b/neonView/PermissionDetailPreview_view/PermissionDetailPreview_view.aod
@@ -11,7 +11,7 @@
     <cardViewTemplate>
       <name>Card</name>
       <iconField>#ICON</iconField>
-      <titleField>#TITLE</titleField>
+      <titleField>#CONTENTTITLE</titleField>
       <entityField>#ENTITY</entityField>
     </cardViewTemplate>
     <genericViewTemplate>
diff --git a/process/Permission_lib/process.js b/process/Permission_lib/process.js
index f449d69f201..247e338f2c5 100644
--- a/process/Permission_lib/process.js
+++ b/process/Permission_lib/process.js
@@ -10,6 +10,8 @@ import("Sql_lib");
  */
 function PermissionUtil () {}
 
+var alias = "_____SYSTEMALIAS";
+
 /**
  * Returns the ids of all subordinated permission sets of a given parent permission set.
  * 
@@ -20,9 +22,9 @@ function PermissionUtil () {}
 PermissionUtil.getAllChildPermissionSets = function (pPermissionSetId) 
 {   
     return db.array(db.COLUMN, SqlCondition.begin()
-        .and("AB_PERMISSIONSET_ID = '" + pPermissionSetId + "'")
-        .buildSql("select AB_PERMISSIONSETID from AB_PERMISSIONSET")
-        );
+        .and("ASYS_PERMISSIONSET_ID = '" + pPermissionSetId + "'")
+        .buildSql("select ASYS_PERMISSIONSETID from ASYS_PERMISSIONSET")
+        , alias);
 }
 
 /**
@@ -35,10 +37,10 @@ PermissionUtil.getAllChildPermissionSets = function (pPermissionSetId)
 PermissionUtil.getChildRecordPermissionSet = function (pPermissionSetId) 
 {   
     return db.array(db.COLUMN, SqlCondition.begin()
-        .and("AB_PERMISSIONSET_ID = '" + pPermissionSetId + "'")
+        .and("ASYS_PERMISSIONSET_ID = '" + pPermissionSetId + "'")
         .and("ACCESSTYPE = 'R'")
-        .buildSql("select AB_PERMISSIONSETID from AB_PERMISSIONSET")
-        );
+        .buildSql("select ASYS_PERMISSIONSETID from ASYS_PERMISSIONSET")
+        , alias);
 }
 
 /**
@@ -51,10 +53,10 @@ PermissionUtil.getChildRecordPermissionSet = function (pPermissionSetId)
 PermissionUtil.getAllChildPermissions = function (pPermissionSetId)
 {
     return db.array(db.COLUMN, SqlCondition.begin()
-        .and("AB_PERMISSIONSET.AB_PERMISSIONSETID = '" + pPermissionSetId + "'")
-        .buildSql("select AB_PERMISSION.AB_PERMISSIONID from AB_PERMISSION"
-            + " join AB_PERMISSIONSET on AB_PERMISSIONSET.AB_PERMISSIONSETID = AB_PERMISSION.AB_PERMISSIONSET_ID")
-        );
+        .and("ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID = '" + pPermissionSetId + "'")
+        .buildSql("select ASYS_PERMISSION.ASYS_PERMISSIONID from ASYS_PERMISSION"
+            + " join ASYS_PERMISSIONSET on ASYS_PERMISSIONSET.ASYS_PERMISSIONSETID = ASYS_PERMISSION.ASYS_PERMISSIONSET_ID")
+        , alias);
 }
 
 /**
@@ -67,10 +69,10 @@ PermissionUtil.getAllChildPermissions = function (pPermissionSetId)
 PermissionUtil.getAllChildPermissionActions = function (pPermissionSetId)
 {
     return db.array(db.COLUMN, SqlCondition.begin()
-        .and("AB_PERMISSION.AB_PERMISSIONSET_ID = '" + pPermissionSetId + "'")
-        .buildSql("select AB_PERMISSIONACTION.AB_PERMISSIONACTIONID from AB_PERMISSIONACTION"
-            + " join AB_PERMISSION on AB_PERMISSION.AB_PERMISSIONID = AB_PERMISSIONACTION.AB_PERMISSION_ID")
-        );
+        .and("ASYS_PERMISSION.ASYS_PERMISSIONSET_ID = '" + pPermissionSetId + "'")
+        .buildSql("select ASYS_PERMISSIONACTION.ASYS_PERMISSIONACTIONID from ASYS_PERMISSIONACTION"
+            + " join ASYS_PERMISSION on ASYS_PERMISSION.ASYS_PERMISSIONID = ASYS_PERMISSIONACTION.ASYS_PERMISSION_ID")
+        , alias);
 }
 
 /**
@@ -83,9 +85,9 @@ PermissionUtil.getAllChildPermissionActions = function (pPermissionSetId)
 PermissionUtil.getAllChildPermissionActions = function (pPermissionId)
 {
     return db.array(db.COLUMN, SqlCondition.begin()
-        .and("AB_PERMISSION_ID = '" + pPermissionId + "'")
-        .buildSql("select AB_PERMISSIONACTIONID from AB_PERMISSIONACTION")
-        );
+        .and("ASYS_PERMISSION_ID = '" + pPermissionId + "'")
+        .buildSql("select ASYS_PERMISSIONACTIONID from ASYS_PERMISSIONACTION")
+        , alias);
 }
 
 /**
@@ -98,9 +100,9 @@ PermissionUtil.getAllChildPermissionActions = function (pPermissionId)
 PermissionUtil.resolvePermissionActionId = function (pPermissionActionId)
 {
     return db.cell(SqlCondition.begin()
-        .and("AB_PERMISSIONACTIONID = '" + pPermissionActionId + "'")
-        .buildSql("select AB_PERMISSIONACTION.ACTION from AB_PERMISSIONACTION")
-        );
+        .and("ASYS_PERMISSIONACTIONID = '" + pPermissionActionId + "'")
+        .buildSql("select ASYS_PERMISSIONACTION.ACTION from ASYS_PERMISSIONACTION")
+        , alias);
 }
 
 /**
@@ -154,8 +156,8 @@ PermissionUtil.indexOfPermId = function(pPermTable, pPermId) {
  * @result {String[]} returns the different elements
  */
 PermissionUtil.getActionDiff = function(pPermId, pActionNew) {
-    var sqlStr = "select ACTION from AB_PERMISSIONACTION where AB_PERMISSION_ID = '" + pPermId + "'";
-    var actionOld = db.array(db.COLUMN, sqlStr);
+    var sqlStr = "select ACTION from ASYS_PERMISSIONACTION where ASYS_PERMISSION_ID = '" + pPermId + "'";
+    var actionOld = db.array(db.COLUMN, sqlStr, alias);
     
     return arrDiff(actionOld, pActionNew);
 }
@@ -175,7 +177,7 @@ PermissionUtil.getActionDiff = function(pPermId, pActionNew) {
  */
 PermissionUtil.isDiff = function(pId, pString, pDbCol, pDbTable) {
     var sqlStr = "select " + pDbCol + " from " + pDbTable + " where " + pDbTable + "ID = '" + pId + "'";
-    var stringDb = db.cell(sqlStr);
+    var stringDb = db.cell(sqlStr, alias);
     return stringDb != pString ? true : false;
 }
 
@@ -197,7 +199,7 @@ PermissionUtil.updateIfDiff = function(pId, pValue, pDbCol, pDbTable) {
         var cols = [pDbCol];
         var vals = [pValue];
         var cond = SqlCondition.begin().and(pDbTable + "ID = '" + pId + "'").build();
-        return db.updateData(pDbTable, cols, null, vals, cond);
+        return db.updateData(pDbTable, cols, null, vals, cond, alias);
     }
     return 0;
 }
@@ -210,16 +212,16 @@ PermissionUtil.updateIfDiff = function(pId, pValue, pDbCol, pDbTable) {
  * @result {String} returns the id of the default permission of the root permission set
  */
 PermissionUtil.getRootPermission = function(pPermId) {
-    var sqlStr = "select AB_PERMISSIONSET_ID from AB_PERMISSION where AB_PERMISSIONID = '" + pPermId + "'";
-    var parentPermSet = db.array(db.ROW, sqlStr);
+    var sqlStr = "select ASYS_PERMISSIONSET_ID from ASYS_PERMISSION where ASYS_PERMISSIONID = '" + pPermId + "'";
+    var parentPermSet = db.array(db.ROW, sqlStr, alias);
 
     while (parentPermSet[0] != "") {
-        sqlStr = "select AB_PERMISSIONSET_ID, AB_PERMISSIONSETID from AB_PERMISSIONSET where AB_PERMISSIONSETID = '" + parentPermSet[0] + "'";
-        parentPermSet = db.array(db.ROW, sqlStr);
+        sqlStr = "select ASYS_PERMISSIONSET_ID, ASYS_PERMISSIONSETID from ASYS_PERMISSIONSET where ASYS_PERMISSIONSETID = '" + parentPermSet[0] + "'";
+        parentPermSet = db.array(db.ROW, sqlStr, alias);
     }
     
-    sqlStr = "select AB_PERMISSIONID from AB_PERMISSION where AB_PERMISSIONSET_ID = '" + parentPermSet[1] + "'";
-    return db.cell(sqlStr);
+    sqlStr = "select ASYS_PERMISSIONID from ASYS_PERMISSION where ASYS_PERMISSIONSET_ID = '" + parentPermSet[1] + "'";
+    return db.cell(sqlStr, alias);
 }
 
 /**
@@ -230,11 +232,11 @@ PermissionUtil.getRootPermission = function(pPermId) {
  * @result {String} returns the id of the default field permission of the root field permission set
  */
 PermissionUtil.getRootFieldPermission = function(pPermId) {
-    var sqlStr = "select AB_PERMISSIONSET_ID from AB_PERMISSION where AB_PERMISSIONID = '" + pPermId + "'";
-    var parentFieldPermSet = db.array(db.ROW, sqlStr);
+    var sqlStr = "select ASYS_PERMISSIONSET_ID from ASYS_PERMISSION where ASYS_PERMISSIONID = '" + pPermId + "'";
+    var parentFieldPermSet = db.array(db.ROW, sqlStr, alias);
     
-    sqlStr = "select AB_PERMISSIONID from AB_PERMISSION where AB_PERMISSIONSET_ID = '" + parentFieldPermSet + "' and cond is null";
-    return db.cell(sqlStr);
+    sqlStr = "select ASYS_PERMISSIONID from ASYS_PERMISSION where ASYS_PERMISSIONSET_ID = '" + parentFieldPermSet + "' and cond is null";
+    return db.cell(sqlStr, alias);
 }
 
 /**
@@ -245,10 +247,10 @@ PermissionUtil.getRootFieldPermission = function(pPermId) {
  * @result {String} returns the id of the default permission of a given permission set
  */
 PermissionUtil.getDefaultPermission = function(pPermSetId) {
-    var sqlStr = "select AB_PERMISSIONID from AB_PERMISSION"
-    + " where AB_PERMISSIONSET_ID = '" + pPermSetId + "'"
+    var sqlStr = "select ASYS_PERMISSIONID from ASYS_PERMISSION"
+    + " where ASYS_PERMISSIONSET_ID = '" + pPermSetId + "'"
     + " and COND is null"
-    return db.cell(sqlStr);
+    return db.cell(sqlStr, alias);
 }
 
 /**
@@ -259,10 +261,10 @@ PermissionUtil.getDefaultPermission = function(pPermSetId) {
  * @result {String[]} returns the ids of the conditional permissions of a given permission set
  */
 PermissionUtil.getConditionalPermission = function(pPermSetId) {
-    var sqlStr = "select AB_PERMISSIONID from AB_PERMISSION"
-    + " where AB_PERMISSIONSET_ID = '" + pPermSetId + "'"
+    var sqlStr = "select ASYS_PERMISSIONID from ASYS_PERMISSION"
+    + " where ASYS_PERMISSIONSET_ID = '" + pPermSetId + "'"
     + " and COND is not null"
-    return db.table(sqlStr);
+    return db.table(sqlStr, alias);
 }
 
 /**
@@ -273,9 +275,9 @@ PermissionUtil.getConditionalPermission = function(pPermSetId) {
  * @result {String[]} returns the ids of linked actions of a given permission
  */
 PermissionUtil.getPermissionAction = function(pPermId) {
-    var sqlStr = "select AB_PERMISSIONACTIONID from AB_PERMISSIONACTION"
-    + " where AB_PERMISSION_ID = '" + pPermId + "'"
-    return db.table(sqlStr);
+    var sqlStr = "select ASYS_PERMISSIONACTIONID from ASYS_PERMISSIONACTION"
+    + " where ASYS_PERMISSION_ID = '" + pPermId + "'"
+    return db.table(sqlStr, alias);
 }
 
 /**
@@ -288,9 +290,9 @@ PermissionUtil.getPermissionAction = function(pPermId) {
  * @result {String} returns the id of the root permission set of the given entity-role-combination
  */
 PermissionUtil.getRootPermissionSet = function(pRole, pEntity) {
-    var sqlStr = "select AB_PERMISSIONSETID from AB_PERMISSIONSET"
+    var sqlStr = "select ASYS_PERMISSIONSETID from ASYS_PERMISSIONSET"
     + " where ROLE_ID = '" + pRole + "' and ENTITY_ID = '" + pEntity +"' and ACCESSTYPE = 'E'";
-    return db.cell(sqlStr);
+    return db.cell(sqlStr, alias);
 }
 
 /**
@@ -301,9 +303,9 @@ PermissionUtil.getRootPermissionSet = function(pRole, pEntity) {
  * @result {String} returns the id of the parent permission set of the given permission
  */
 PermissionUtil.getParentPermissionSet = function(pPermId) {
-    var sqlStr = "select AB_PERMISSIONSET_ID from AB_PERMISSION"
-    + " where AB_PERMISSIONID = '" + pPermId + "'";
-    return db.cell(sqlStr);
+    var sqlStr = "select ASYS_PERMISSIONSET_ID from ASYS_PERMISSION"
+    + " where ASYS_PERMISSIONID = '" + pPermId + "'";
+    return db.cell(sqlStr, alias);
 }
 
 /**
@@ -331,7 +333,7 @@ PermissionUtil.permSetIsEmpty = function(pPermSetId) {
  * @result {String[]} returns ids of all permissions
  */
 PermissionUtil.getAllPermissions = function(pPermSetIds) {
-    return db.table("select AB_PERMISSIONID from AB_PERMISSION where AB_PERMISSION.AB_PERMISSIONSET_ID in ('" + pPermSetIds.join("','") + "')");
+    return db.table("select ASYS_PERMISSIONID from ASYS_PERMISSION where ASYS_PERMISSION.ASYS_PERMISSIONSET_ID in ('" + pPermSetIds.join("','") + "')", alias);
 }
 
 /**
@@ -342,7 +344,7 @@ PermissionUtil.getAllPermissions = function(pPermSetIds) {
  * @result {String[]} returns ids of all permission actions
  */
 PermissionUtil.getAllPermissionActions = function(pPermIds) {
-    return db.table("select AB_PERMISSIONACTIONID from AB_PERMISSIONACTION where AB_PERMISSIONACTION.AB_PERMISSION_ID in ('" + pPermIds.join("','") + "')");
+    return db.table("select ASYS_PERMISSIONACTIONID from ASYS_PERMISSIONACTION where ASYS_PERMISSIONACTION.ASYS_PERMISSION_ID in ('" + pPermIds.join("','") + "')", alias);
 }
 
 /**
@@ -353,7 +355,7 @@ PermissionUtil.getAllPermissionActions = function(pPermIds) {
  * @result {String} returns the value of condition type (true or false)
  */
 PermissionUtil.getPermissionCondType = function(pPermId) {
-    return db.cell("select CONDTYPE from AB_PERMISSION where AB_PERMISSION.AB_PERMISSIONID = '" + pPermId + "'");
+    return db.cell("select CONDTYPE from ASYS_PERMISSION where ASYS_PERMISSION.ASYS_PERMISSIONID = '" + pPermId + "'", alias);
 }
 
 /**
@@ -366,8 +368,8 @@ PermissionUtil.getPermissionCondType = function(pPermId) {
  * @result {String[]} returns the element which is a duplicate, otherwise null
  */
 PermissionUtil.containsDuplicateActions = function(pPermId, pActionNew) {
-    var sqlStr = "select ACTION from AB_PERMISSIONACTION where AB_PERMISSION_ID = '" + pPermId + "'";
-    var actionsOld = db.array(db.COLUMN, sqlStr);
+    var sqlStr = "select ACTION from ASYS_PERMISSIONACTION where ASYS_PERMISSION_ID = '" + pPermId + "'";
+    var actionsOld = db.array(db.COLUMN, sqlStr, alias);
     var actionsNew = pActionNew.split(",");
     var res = null
     
@@ -379,7 +381,7 @@ PermissionUtil.containsDuplicateActions = function(pPermId, pActionNew) {
 }
 
 /**
- * Inserts a new instance of a permission set into AB_PERMISSIONSET.
+ * Inserts a new instance of a permission set into ASYS_PERMISSIONSET.
  * 
  * @param {String} pParentPermSet The parent permission set, empty if root node
  * 
@@ -394,16 +396,16 @@ PermissionUtil.containsDuplicateActions = function(pPermId, pActionNew) {
  * @result {Integer} returns the id of the inserted permission set
  */
 PermissionUtil.insertNewPermissionSet = function(pParentPermSet, pEntity, pRole, pField, pAccessType) {
-    var table = "AB_PERMISSIONSET";
+    var table = "ASYS_PERMISSIONSET";
     var cols = db.getColumns(table);
     var permsetid = util.getNewUUID();
-    var vals = [permsetid, pParentPermSet, pAccessType, pEntity, pField, pRole];
-    db.insertData(table, cols, null, vals);
+    var vals = [pAccessType, permsetid, pParentPermSet, pEntity, pField, pRole];
+    db.insertData(table, cols, null, vals, alias);
     return permsetid;
 }
 
 /**
- * Inserts a new instance of a permission into AB_PERMISSION.
+ * Inserts a new instance of a permission into ASYS_PERMISSION.
  * 
  * @param {String} pParentPermSet The parent permission set
  * 
@@ -414,16 +416,16 @@ PermissionUtil.insertNewPermissionSet = function(pParentPermSet, pEntity, pRole,
  * @result {Integer} returns the id of the inserted permission
  */
 PermissionUtil.insertNewPermission = function(pParentPermSet, pCond, pCondType) {
-    var table = "AB_PERMISSION";
+    var table = "ASYS_PERMISSION";
     var cols = db.getColumns(table);
     var permid = util.getNewUUID(); 
     var vals = [permid, pParentPermSet, pCond, pCondType];
-    db.insertData(table, cols, null, vals);  
+    db.insertData(table, cols, null, vals, alias);  
     return permid;
 }
 
 /**
- * Inserts a new instance of a permission action into AB_PERMISSIONACTION.
+ * Inserts a new instance of a permission action into ASYS_PERMISSIONACTION.
  * 
  * @param {String} pParentPerm The parent permission
  * 
@@ -432,11 +434,11 @@ PermissionUtil.insertNewPermission = function(pParentPermSet, pCond, pCondType)
  * @result {Integer} returns the id of the inserted permission action
  */
 PermissionUtil.insertNewPermissionAction = function(pParentPerm, pAction) {
-    var table = "AB_PERMISSIONACTION";
+    var table = "ASYS_PERMISSIONACTION";
     var cols = db.getColumns(table);
     var permactionid = util.getNewUUID();
-    var vals = [permactionid, pParentPerm, pAction];
-    db.insertData(table, cols, null, vals);
+    var vals = [pAction, permactionid, pParentPerm];
+    db.insertData(table, cols, null, vals, alias);
     return permactionid;
 }
 
-- 
GitLab