Models Security
All model bindings and rules are processed with model owner's permissions. It effectively means that:
Binding expressions are calculated with the model owner's permissions
The binding target is also written with the model owner's permissions
Rule expressions are also evaluated with the model owner's permissions
Thus, the model may access only data that is accessible by its owner.
![]() | If you create a copy of a certain model under another user account, the copy may not function properly if new model's owner has no permissions to access data referred by the bindings of the cloned model. |
Model Modification
Only users that have Administrator effective permission level in the model context may modify model configuration. This ensures maximum security for the potentially dangerous model operations.
Custom Model Functions Security
Model functions that have custom implementations can potentially access any server data. Thus, system administrators developing function implementation code should always respect security model and use only the instance of CallerController
object that has been passed to the FunctionImplementation.execute()
.
Instantiable Model Instances Security
If containers of an instantiable model were attached to user contexts (see Using Instantiable Models), it may seem that each instance will inherit permissions of a user to those context a container is attached. However, it's not the case! Each instance will inherit permissions of the model owner.
Was this page helpful?