Securing Application Access Summary

Securing Applications Against Unauthorized Applications Module Recap

Core concepts:
  • Runtime Access Tracking manages script access to resources from other applications
    • Table
    • Script Include
    • Scriptable
  • Runtime Access settings are:
    • None
    • Tracking
    • Enforcing
  • Application Access controls which scope(s) can perform database operations against application tables:
    • This application scope only
    • All application scopes
  • Application Access restricts database operations:
    • Can read
    • Can write
    • Can update
    • Can delete
  • Can disable table access by web services
  • Restrict whether out-of-scope applications can create application files:
    • Business Rules
    • New fields
    • Client Scripts
    • UI Actions