Setting Up Custom Security Rules

It is possible to define precise Security Rules that will be evaluated at runtime to perform “code based” choices for determining if a user can or cannot perform an action.

Most of the common use cases are solved using the Setting Up Permissions and Roles capabilities, which itself is backed by the Custom Security rules capabilities, so we suggest you get well aware of these capabilities before diving into the custom security rules engine.

The engine is can be setup using the Technical Admin back-office :