You can create ACL rules on the various components of the system.
Record ACL rules consist of table and field names.
ACL rules can secure the following record operations:
Operation | Description |
---|---|
Create | Allows users inserting new records (rows) into a table. |
Read | Allows users displaying records from a table. |
Write | Allows users updating records in a table. |
Delete | Allows users removing records from a table or drop a table. |
The processing of record ACL rules goes as follows:
This order ensures that users get access to more general objects before getting access to more specific objects. user must pass both table and field ACL rules to access a record object.
First, the table ACL rule must be passed. The base system includes wildcard (*) ACL rules that match any table or any column. So the user must always pass at least one table ACL rule. The base system provides additional table ACL rules to control access to specific tables.
Table ACL rules are processed in the as described below:
If user fails ALL table ACL rules, then the user cannot access the fields in any tables. If user passes a table ACL rule, the system then evaluates the field ACL rules.
After a table ACL rule passed, then field ACL rules are processed in the following order:
The user must pass the field ACL rule; otherwise, access to the table fields will be denied. For example: the user wants to access the Number field in the Incident table. In this case, the user must first pass the table ACL rule.
The first successful field ACL evaluation stops ACL rule processing at the field level. When user passes a field ACL rule, the system stops searching for other matching field ACL rules. For example, if user passes the field ACL rule for incident.number, the system stops searching for other ACL rules that secure the Number field in the Incident table.