Access Flashcards

1
Q

What permissions are given when the “Allow configuration” Application Access option is selected on a table?

A

Out of scope apps can create application files for tables:

  • Business Rules
  • Client Scripts
  • New Fields (dictionary entries)
  • UI Actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the ACL table.None give permission to?

A

Entire table (needed to set more specific rules)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the ACL table.field give permission to?

A

Specific fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the ACL table.* give permission to?

A

Field level
- all fields but those who have their own rule (table.field)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How must Application Access be configured to prevent all other private application scopes from creating configuration records on an application’s data tables?

A

Set the ‘Accessible from’ field value to ‘This application scope only’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What access needs to be given for out-of-scope applications to be able to create Business Rules?

A

When
1. Accessible from is’ All application scopes’
2. ‘Can read’ is selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What access needs to be given for out-of-scope applications to be able to create UI Actions?

A

When
1. Accessible from is ‘All application scopes’
2. ‘Can read’ is selected
3. ‘Allow configuration’ are selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What access needs to be given for out-of-scope applications to be able to create fields?

A

When
1. Accessible from is ‘All application scopes’
2. ‘Can read’ is selected
3. ‘Allow configuration’ are selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which roles grant access to source control repository operations such as importing applications from source control, or linking an application to source control?

A
  • admin
  • source_control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What modules enables security rule debugging?

A

System Security > Debugging > Debug Security Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the baseline access rules of a table in a privately-scoped application?

A
  1. Accessible from is ‘All application scopes’
  2. ‘Can read’ is selected
  • All app scopes can read from the table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can you never do when working with global application files?

A

Move application files into or out of a scoped applciation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which Application Access configuration field(s) are NOT available if the Can read configuration field is NOT selected?

A

Can create
Can update
Can delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protection policies are not applied when installed via update sets (TRUE/FALSE)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Assume an application scope, sn_my_app, exists. Scripts from other application scopes can never delete records from tables in the sn_my_app scope (TRUE/FALSE)?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What function(s) is used to check the logged in users role in a BR?

A

gs.hasRole()

17
Q

What function(s) is used to check the logged in users role in a client script?

A

g_form.hasRole()
- returns true if the current user has the specified role or the admin role

g_form.hasRoleExactly()
- determines whether the current user has the specified role