Mastering Qlik Sense
by Ralf Becher, Karl Pover, Jason Michaelides, Dilyana Ivanova, David Alcobero, Martin Mahler, Juan Ignacio Vitantonio
Security rules actions
Within security rules, Actions form the second part (out of four, see previous section, Attribute-Based Access Control) of the ACAB and determine what type of activity the user is permitted to perform on the defined resource. While read and write are common actions very familiar to traditional access control, Qlik Sense has extended them to many more, which, on one side, makes the security rules rich and powerful; but on the other side, complicated as well. This section will cover the different types of actions in Qlik's security rules and will discuss potential use cases where relevant. Each action applies to a specified resource, which forms the basis of how it can be utilized.
Permissions on actions are applied ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access