O'Reilly logo

Mastering ServiceNow - Second Edition by Martin Wood

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Building security rules

As we work through the rest of the chapter, we'll use the following scenarios to implement different security rules. They outline particular use cases. I find this very helpful to organize exactly what is necessary to implement.

  • Only authorized users are allowed to create or edit Maintenance tasks. The records become read-only when the tasks are closed.
  • Only a team leader is allowed to edit the Priority field when any task is not closed.
  • A user can only add to Work notes for a Maintenance task if they are on the Work notes list or in the Assigned to field.

Conditioning contextual security

A contextual security rule is made up of three elements. These are evaluated together to determine if the user can carry out a particular ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required