Previous Topic: Combined Class Permissions Required for Specific ActionsNext Topic: Security Levels


Object Permissions

Setting object permissions is helpful when you want to restrict the access rights on a particular object. By default, all objects inherit the permissions set for the object class.

Object permissions take precedence over the class and group permissions.

The object permissions are always present and managed by the security subsystem and cannot be disabled. If you do not want to take care of object permissions you may set the class-level permissions for all security classes to Full Control.

Authorization is based on the concept of an Access Control Entry (ACE). An ACE is any combination of the code letters shown in the following table, for example, VR. This ACE allows you to show and read objects; any other access is denied.

If the ACE is empty (contains no code letter), no access right is granted at all.

The following table defines object permissions:

Code letter
in ACE

Meaning

Rights Granted

V

View

Allows you to show objects

C

Create

Allows you to create objects

R

Read

Allows you to read sub-objects of an object

W

Write

Allows you to change an object

X

Execute

Allows execution, depends on object type

D

Delete

Allows you to delete objects

P

Permission

Allows you to change the ACE itself

O

Ownership

Allows you to take ownership of an object

A user may belong to one or more security profiles. A user can also be the owner of an object. A set of security classes is assigned to each security profile. The security class permission defines the default permission that is assigned to an object when an instance of the class is created.

The following illustration shows how security profiles, security classes and object permissions are related to each other and that an object inherits the rights from the security class where the object is an instance of:

Graphic showing relationship between security profiles, security classes, and object permissions

In the illustration, user 1 belongs to security profile A, user 2 belongs to security profile A and is also owner of objects, represented by an ACE. User 1 and user 2 have specific ACEs, for example, VR, through security profile A. User 2 has an additional ACE, for example, VCRWD, as owner of an object.

To check the access rights of user 1 and user 2 to an object, the security system makes a (logical) union of the user-specific ACE and the ACE associated to the specific secured object. In the example, both user 1 and user 2 have "view" and "read" rights to the object, but only user 2 has write or delete access.