Row level security

Permission graph

Permission graph image

Policy matrix

APAAAModuleObject / ExpressionAffected Role / ClassificationSelectInsertUpdateDeletePolicy name
logAuditEntry
AnyoneAanyone__allow_insert
ControllerRole.Admin ControllerRole.AuditorAadmin_auditor__allow_select
XauthAccount
global auth::current_account.id equal to .id propertyAAAAowner__allow_all
ControllerRole.ServiceAAservice__allow_select_insert
XauthProfile
Account linked to .owner propertyAAAowner__allow_select_insert_update
Account with .enabled property set to trueAenabled_account__allow_select
XauthTenantMembership
TenantRole.ManagerAAAAmanager__allow_all
((.tenant_role ?= TenantRole.Member) and (.tenant_role ?= TenantRole.Guest))TenantRole.MaintainerAAAmaintainer__allow_insert_update_delete_on_members_and_guests
TenantRole.Member TenantRole.MaintainerAmember_maintainer__allow_select
XauthTeamMembership
TeamRole.Leader TenantRole.Manager TenantRole.MaintainerAAAAleader_manager_maintainer__allow_all
(.team_role ?= TeamRole.Analyst)TeamRole.ModeratorAAAmoderator__allow_insert_update_delete_on_analysts
Account in .team.tenant.membershipsAtenant_membership__allow_select
XidentTeam
TeamRole.Leader TenantRole.ManagerAAAAleader_manager__allow_all
TeamRole.Moderator TenantRole.MaintainerAmoderator_maintainer__allow_update
Account in .tenant.membershipsAtenant_membership__allow_select
XinfraTenant
TenantRole.ManagerAAAAmanager__allow_all
TenantRole.MaintainerAAmaintainer__allow_select_update
Account in .membershipAmembership__allow_select
XinfraRelay
TenantRole.ManagerAAAAmanager__allow_all
TenantRole.MaintainerAmaintainer__allow_select_update
ControllerRole.Service or Account in .tenant.membershipsAservice_tenant_membership_allow_select
(.shared == true)AnyoneAanyone__allow_select_on_shared
XinfraNode
TenantRole.Manager TeamRole.LeaderAAAAmanager_leader__allow_all
TenantRole.Maintainer TeamRole.ModeratorAmaintainer_moderator__allow_update
ControllerRole.Service or Account in .campaign.team.membershipAservice_team_membership__allow_select
XinfraDomain
TenantRole.Manager TeamRole.LeaderAAAAmanager_leader__allow_all
ControllerRole.Service TenantRole.MaintainerAservice_maintainer__allow_update
Account in .campaign.team.membershipsAteam_membership__allow_select
XinfraRoute
TenantRole.ManagerAAAAmanager__allow_all
ControllerRole.ServiceAAservice__allow_select_update

Legend

KeywordExplanation
AAllow
DDeny
AccountAccount linked to ID passed as global variable auth::current_account_id within database connection. It can be accessed via global auth::current_account.

Access policies

Admin Allow All

internal::APAAA
Allows all accounts with ControllerRole.Admin applied to perform ALL kind of operations on a specific dataset.

access policy internal__controller_admin__allow_all
	allow all
	using (global auth::current_account.controller_role ?= auth::ControllerRole.Admin) {
		errmessage := 'Controller role "Admin" required'
	}