Skip to main content Skip to complementary content

Security rules included in Qlik Sense

In a Qlik Sense installation, a number of security rules are included by default and available in the QMC. The security rules can be used to grant users access to areas in Qlik Sense. There are three types of rules: Default, Read only, and Custom. The Read only rules are essential to Qlik Sense and cannot be edited or deleted. The Default rules can be edited. When you edit a Default rule or create a new rule, the type is changed to Custom.

Information noteIf you want to edit a Default rule, we strongly recommend that you create a copy of the original and edit the copy, because you may want to use original rule later on. Remember to disable the original rule before using the copy.

The following security rules are included by default in a Qlik Sense installation.

AuditAdmin

AuditAdmin security rule properties
Property Details
Name AuditAdmin
Description Audit admin should have access rights to audit entities
Resource filter

*

Actions Read
Context Only in QMC
Type Default
Conditions user.roles = "AuditAdmin" and !(resource.resourcetype = "TransientObject" and resource.name like "QmcSection_*")

AuditAdminQmcSections

AuditAdminQmcSections security rule properties
Property Details
Name AuditAdminQmcSections
Description Audit admin should have access rights to audit related sections
Resource filter

License_*,TermsAcceptance_*,QmcSection_AppDistributionStatus,QmcSection_CloudDistribution, QmcSection_Tag,QmcSection_Audit,QmcSection_DeploymentSetup,QmcSection_EngineHealth

Actions Read
Context Only in QMC
Type Default
Conditions ((user.roles="AuditAdmin"))

Content library content

Content library content security rule properties
Property Details
Name Content library content
Description Allows everyone that can see a content library to see its corresponding files
Resource filter

StaticContentReference_*

Actions Read
Context Both in hub and QMC
Type Read only
Conditions resource.ContentLibrarys.HasPrivilege("Read")

Content library manage content

Content library manage content security rule properties
Property Details
Name Content library manage content
Description Allows everyone that can update a content library to manage its corresponding files
Resource filter

StaticContentReference_*

Actions Create, Read, Update, Delete
Context Both in hub and QMC
Type Read only
Conditions resource.ContentLibrarys.HasPrivilege("Update")

ContentAdmin

ContentAdmin security rule properties
Property Details
Name ContentAdmin
Description Content admin should have access rights to content related sections
Resource filter

Stream_*,App*,ReloadTask_*,ExternalProgramTask_*,UserSyncTask_*, SchemaEvent_*,User*,CustomProperty*,Tag_*,DataConnection_*,CompositeEvent_*,Extension_*,ContentLibrary_*,FileExtension_*,FileExtensionWhiteList_*,SystemNotification_*,ExternalProductSignOn_*,CustomBannerMessage_*

Actions Create, Read, Update, Delete, Export, Publish, Change owner, Duplicate, Approve
Context Only in QMC
Type Default
Conditions ((user.roles="ContentAdmin"))

ContentAdminQmcSections

ContentAdminQmcSections security rule properties
Property Details
Name ContentAdminQmcSections
Description Content admin should have access rights to content related sections
Resource filter

License_*,TermsAcceptance_*,QmcSection_Stream,QmcSection_App,QmcSection_App.Object, QmcSection_AppDistributionStatus,QmcSection_CloudDistribution,QmcSection_DataConnection, QmcSection_Tag,QmcSection_User,QmcSection_CustomPropertyDefinition,QmcSection_Task, QmcSection_Event, QmcSection_SchemaEvent,QmcSection_CompositeEvent,QmcSection_Extension, QmcSection_ReloadTask,QmcSection_UserSyncTask,QmcSection_ContentLibrary, QmcSection_Audit,QmcSection_AnalyticConnection,QmcSection_SystemNotification, QmcSection_SystemNotificationPolicy,QmcSection_DeploymentSetup,QmcSection_CustomBannerMessage,QmcSection_ExternalProductSignOn,QmcSection_EngineHealth

Actions Read
Context Only in QMC
Type Default
Conditions ((user.roles="ContentAdmin"))

ContentAdminReadOnly

ContentAdminReadOnly security rule properties
Property Details
Name ContentAdminReadOnly
Description Content admin should have Read access rights to content related entities
Resource filter

EngineHealth_*

Actions Read
Context Only in QMC
Type Default
Conditions ((user.roles="ContentAdmin"))

ContentAdminRulesAccess

ContentAdminRulesAccess security rule properties
Property Details
Name ContentAdminRulesAccess
Description Content admin should have access rights to manage security rules for streams, data connections, content libraries and extensions
Resource filter

SystemRule_*

Actions Create, Read, Update, Delete
Context Only in QMC
Type Default
Conditions user.roles = "ContentAdmin" and (resource.category = "Security" and (resource.resourcefilter matches "Stream_\w{8}-\w{4}-\w{4}-\w{4}-\w{12}" or resource.resourcefilter matches "DataConnection_\w{8}-\w{4}-\w{4}-\w{4}-\w{12}" or resource.resourcefilter matches "ContentLibrary_\w{8}-\w{4}-\w{4}-\w{4}-\w{12}" or resource.resourcefilter matches "Extension_\w{8}-\w{4}-\w{4}-\w{4}-\w{12}") or (resource.category = "Generic" and resource.subcategory = "SystemNotification"))

CreateApp

CreateApp security rule properties
Property Details
Name CreateApp
Description Everyone is allowed to create apps except anonymous users
Resource filter

App_*

Actions Create
Context Only in hub
Type Default
Conditions !user.IsAnonymous()

CreateAppObjectsPublishedApp

CreateAppObjectsPublishedApp security rule properties
Property Details
Name CreateAppObjectsPublishedApp
Description If you have read rights on a published app you should be able to create sheets, stories, bookmarks and snapshots belonging to that app
Resource filter

App.Object_*

Actions Create
Context Only in hub
Type Default
Conditions !resource.App.stream.Empty() and resource.App.HasPrivilege("read") and (resource.objectType = "userstate" or resource.objectType = "sheet" or resource.objectType = "story" or resource.objectType = "bookmark" or resource.objectType = "snapshot" or resource.objectType = "embeddedsnapshot" or resource.objectType = "hiddenbookmark") and !user.IsAnonymous()

CreateAppObjectsUnPublishedApp

CreateAppObjectsUnPublishedApp security rule properties
Property Details
Name CreateAppObjectsUnPublishedApp
Description If you have read rights on an unpublished app you should be able to create app objects belonging to that app
Resource filter

App.Object_*

Actions Create
Context Only in hub
Type Default
Conditions resource.App.stream.Empty() and resource.App.HasPrivilege("read") and !user.IsAnonymous()

CreateOdagLinks

CreateOdagLinks security rule properties
Property Details
Name CreateOdagLinks
Description Non-anonymous users with read access to the ODAG template app can create links and it is possible to create a link without first knowing the template app
Resource filter

OdagLink_*

Actions Create
Context Only in hub
Type Default
Conditions !user.IsAnonymous() and (resource.templateApp.Empty() or resource.templateApp.HasPrivilege("read"))

CreateOdagLinkUsage

CreateOdagLinkUsage security rule properties
Property Details
Name CreateOdagLinkUsage
Description Non-anonymous users with read access to the selectionApp and read access to the link can create OdagLinkUsages
Resource filter

OdagLinkUsage_*

Actions Create
Context Only in hub
Type Default
Conditions !user.IsAnonymous() and (resource.selectionApp.Empty() or resource.selectionApp.HasPrivilege("read")) and (resource.link.Empty() or resource.link.HasPrivilege("read"))

CreateOdagRequest

CreateOdagRequest security rule properties
Property Details
Name CreateOdagRequest
Description Non-anonymous users with read access to the link can create new Requests using that link
Resource filter

OdagRequest_*

Actions Create
Context Only in hub
Type Default
Conditions !user.IsAnonymous() and (resource.link.HasPrivilege("read"))

Custom banner message

Custom banner message security rule properties
Property Details
Name Custom banner message
Description Allows all users to see the custom banner messages
Resource filter

CustomBannerMessage_*

Actions Read
Context Only in hub
Type Default
Conditions true

DataConnection

DataConnection security rule properties
Property Details
Name DataConnection
Description It should be possible to create data connections except of type folder
Resource filter

DataConnection_*

Actions Create
Context Only in hub
Type Default
Conditions ((resource.type!="folder"))

DataPrepAppCacheAccessRule

DataPrepAppCacheAccessRule security rule properties
Property Details
Name DataPrepAppCacheAccessRule
Description Everyone, except anonymous users, should have read rights to data connections
Resource filter

DataConnection_<Connection_ID>

Actions Read
Context Both in hub and QMC
Type Custom
Conditions !user.isAnonymous()

Default content library

Default content library security rule properties
Property Details
Name Default content library
Description The default content library should be visible for all users
Resource filter

ContentLibrary_<Content library ID>

Actions Read
Context Both in hub and QMC
Type Default
Conditions true

DeleteOdagLinkUsage

DeleteOdagLinkUsage security rule properties
Property Details
Name DeleteOdagLinkUsage
Description Non-anonymous users with read access on the selection app can delete OdagLinkUsages for that app
Resource filter

OdagLinkUsage_*

Actions Read, Delete
Context Only in hub
Type Default
Conditions !user.IsAnonymous() and resource.selectionApp.HasPrivilege("read")

DeploymentAdmin

DeploymentAdmin security rule properties
Property Details
Name DeploymentAdmin
Description Deployment admin should have access rights to deployment related entities
Resource filter

ServiceCluster_*,ServerNodeConfiguration_*,Engine*,Proxy*,VirtualProxy*,Repository*,Printing*,Scheduler*, User*,CustomProperty*,Tag_*,License*, TermsAcceptance_*,ReloadTask_*,ExternalProgramTask_*, UserSyncTask_*,SchemaEvent_*,CompositeEvent_*, Deployment_*,IdentityProviderSettings_*, SystemNotification_*, ExternalProductSignOn_*,CustomBannerMessage_*

Actions Create, Read, Update, Delete
Context Only in QMC
Type Default
Conditions ((user.roles="DeploymentAdmin"))

DeploymentAdminAppAccess

DeploymentAdminAppAccess security rule properties
Property Details
Name DeploymentAdminAppAccess
Description Deployment admin should have access rights to see and update apps in order to handle load balancing rules
Resource filter

App_*

Actions Read, Update
Context Only in QMC
Type Default
Conditions ((user.roles="DeploymentAdmin"))

DeploymentAdminQmcSections

DeploymentAdminQmcSections security rule properties
Property Details
Name DeploymentAdminQmcSections
Description Deployment admin should have access rights to deployment related sections
Resource filter

License_*,TermsAcceptance_*,ServiceStatus_*,QmcSection_AppDistributionStatus, QmcSection_CloudDistribution,QmcSection_Tag,QmcSection_Templates,QmcSection_ServiceCluster, QmcSection_ServerNodeConfiguration,QmcSection_EngineService,QmcSection_ProxyService, QmcSection_VirtualProxyConfig,QmcSection_RepositoryService, QmcSection_SchedulerService,QmcSection_PrintingService,QmcSection_License*,QmcSection_Token, LoadbalancingSelectList,QmcSection_User,QmcSection_UserDirectory,QmcSection_CustomPropertyDefinition, QmcSection_Certificates,QmcSection_Certificates.Export,QmcSection_Task,QmcSection_App,QmcSection_SyncRule, QmcSection_LoadBalancingRule,QmcSection_Event,QmcSection_ReloadTask,QmcSection_UserSyncTask,QmcSection_Audit, QmcSection_DistributionPolicy,QmcSection_SystemNotification,QmcSection_SystemNotificationPolicy, QmcSection_DeploymentSetup,QmcSection_CustomBannerMessage,,QmcSection_ExternalProductSignOn,QmcSection_EngineHealth

Actions Read
Context Only in QMC
Type Default
Conditions ((user.roles="DeploymentAdmin"))

DeploymentAdminReadOnly

DeploymentAdminReadOnly security rule properties
Property Details
Name DeploymentAdminReadOnly
Description Deployment admin should have Read access rights to deployment related entities
Resource filter

EngineHealth_*

Actions Read
Context Only in QMC
Type Default
Conditions ((user.roles="DeploymentAdmin"))

DeploymentAdminRulesAccess

DeploymentAdminRulesAccess security rules properties
Property Details
Name DeploymentAdminRulesAccess
Description Deployment admin should have access rights to manage sync and license rules
Resource filter

SystemRule_*

Actions Create, Read, Update, Delete
Context Only in QMC
Type Default
Conditions user.roles = "DeploymentAdmin" and (resource.category = "Sync" or resource.category = "License" or resource.category = "Generic")

ExportAppData

ExportAppData security rule properties
Property Details
Name ExportAppData
Description Everyone is allowed to export the app data they are allowed to see, except anonymous users
Resource filter

App_*

Actions Export data
Context Both in hub and QMC
Type Default
Conditions resource.HasPrivilege("read") and !user.IsAnonymous()

Extension

Extension security rule properties
Property Details
Name Extension
Description Everyone can view extensions
Resource filter

Extension_*

Actions Read
Context Both in hub and QMC
Type Default
Conditions true

Extension manage content

Extension manage content security rule properties
Property Details
Name

Extension manage content

Description Allows everyone that can update an extension to manage its corresponding files
Resource filter

StaticContentReference_*

Actions Create, Read, Update, Delete
Context Both in hub and QMC
Type Read only
Conditions resource.Extensions.HasPrivilege("Update")

Extension static content

Extension static content security rule properties
Property Details
Name

Extension static content

Description Allows everyone that can see an extension to see its corresponding files
Resource filter

StaticContentReference_*

Actions Read
Context Both in hub and QMC
Type Read only
Conditions resource.Extensions.HasPrivilege("Read")

File upload connection object

File upload connection object security rule properties
Property Details
Name

File upload connection object

Description Data connection used for uploading files to server
Resource filter

DataConnection_<data_connection_ID>

Actions Read
Context Both in hub and QMC
Type Default
Conditions !user.IsAnonymous()

FolderDataConnection

FolderDataConnection security rule properties
Property Details
Name

FolderDataConnection

Description It should be possible for admins to create folder data connections
Resource filter

DataConnection_*

Actions Create, Read, Update, Delete
Context Only in hub
Type Default
Conditions resource.type = "folder" and (user.roles = "RootAdmin" or user.roles = "ContentAdmin" or user.roles = "SecurityAdmin")

HubAdmin

HubAdmin security rule properties
Property Details
Name HubAdmin
Description HubAdmins should be able to create and update Reloadtasks and SchemaEvents in the hub
Resource filter

ReloadTask_*,SchemaEvent_*,ExternalProductSignOn_*

Actions Create, Read, Update
Context Only in hub
Type Default
Conditions ((user.roles="HubAdmin"))

HubSectionHome

HubSectionHome security rule properties
Property Details
Name HubSectionHome
Description Allows all users to access the home hub section
Resource filter

HubSection_Home

Actions Read
Context Both in hub and QMC
Type Default
Conditions true

HubSectionTask

HubSectionTask security rule properties
Property Details
Name HubSectionTask
Description Allows all users to access the task hub section
Resource filter

HubSection_Task

Actions Read
Context Only in hub
Type Default
Conditions true

Installed static content

Installed static content security rule properties
Property Details
Name Installed static content
Description Allows everyone to read installed static content
Resource filter

StaticContentReference_*

Actions Read
Context Both in hub and QMC
Type Read only
Conditions ((resource.StaticContentSecurityType="Open"))

ManageAnalyticConnection

ManageAnalyticConnection security rule properties
Property Details
Name ManageAnalyticConnection
Description RootAdmin, ContentAdmin and SecurityAdmin roles should be able to manage an analytical connection
Resource filter

AnalyticConnection_*

Actions Create, Read, Update, Delete
Context Both in hub and QMC
Type Default
Conditions ((user.roles="RootAdmin" or user.roles="ContentAdmin" or user.roles="SecurityAdmin"))

Offline access

Offline access security rule properties
Property Details
Name Offline access
Description Everyone is allowed offline access to the app they are allowed to see except anonymous users
Resource filter

App_*

Actions Access offline
Context Both in hub and QMC
Type Default
Conditions resource.HasPrivilege("read") and !user.IsAnonymous()

Owner

Owner security rule properties
Property Details
Name Owner
Description The owner of a resource should be able to do Update and Delete actions if the resource is not published to a stream
Resource filter

*

Actions Update, Delete
Context Both in hub and QMC
Type Default
Conditions resource.IsOwned() and (resource.owner = user and !((resource.resourcetype = "App" and !resource.stream.Empty()) or (resource.resourcetype = "App.Object" and resource.published = "true")))

OwnerAnonymousTempContent

OwnerAnonymousTempContent security rule properties
Property Details
Name OwnerAnonymousTempContent
Description An anonymous owner of temporary content should be able to access and delete it
Resource filter

TempContent_*

Actions Read, Delete
Context Both in hub and QMC
Type Read only
Conditions user.IsAnonymous() and resource.anonymousOwnerUserId = user.userId

OwnerAppApproveAppObject

OwnerAppApproveObject security rule properties
Property Details
Name OwnerAppApproveAppObject
Description The owner of an app should be able to approve app objects belonging to the app
Resource filter

App.Object_*

Actions Approve
Context Both in hub and QMC
Type Default
Conditions resource.App.owner = user

OwnerPublishAppObject

OwnerPublishAppObject security rule properties
Property Details
Name OwnerPublishAppObject
Description The owner of an app object should be able to publish an object unless it is approved
Resource filter

App.Object_*

Actions Publish
Context Both in hub and QMC
Type Default
Conditions resource.IsOwned() and resource.owner = user and resource.approved = "false" and resource.app.stream.HasPrivilege("publish")

OwnerPublishDuplicate

OwnerPublishDuplicate security rule properties
Property Details
Name OwnerPublishDuplicate
Description The owner of an app or a stream should be able to publish, and the owner of an app should be able to duplicate
Resource filter

App_*,Stream_*

Actions Publish, Duplicate
Context Both in hub and QMC
Type Default
Conditions resource.IsOwned() and resource.owner = user

OwnerRead

OwnerRead security rule properties
Property Details
Name OwnerRead
Description The owner of a resource should be able to see the resource if it is published to a stream
Resource filter

*

Actions Read
Context Both in hub and QMC
Type Read only
Conditions resource.IsOwned() and resource.owner = user

OwnerUpdateApp

OwnerUpdateApp security rule properties
Property Details
Name OwnerUpdateApp
Description The owner of an app should be able to do update action
Resource filter

App_*

Actions Update
Context Both in hub and QMC
Type Default
Conditions resource.IsOwned() and resource.owner = user

QMCCachingSupport

QMCCachingSupport security rule properties
Property Details
Name QMCCachingSupport
Description Enable this rule along with QmcCacheEnabled flag to support QMC-caching
Resource filter

ExecutionSession_*,ExecutionResult_*,*TaskOperational*

Actions Read
Context Only in QMC
Type Default
Conditions ((user.roles="ContentAdmin" or user.roles="DeploymentAdmin"))

ReadAnalyticConnectionEveryone

ReadAnalyticConnectionEveryone security rule properties
Property Details
Name ReadAppContentFiles
Description Non-anonymous users can read an analytic connection
Resource filter

AnalyticConnection_*

Actions Read
Context Only in hub
Type Read only
Conditions !user.IsAnonymous()

ReadAppContentFiles

ReadAppContentFiles security rule properties
Property Details
Name ReadAppContentFiles
Description Allows everyone that can see an app to see its content files
Resource filter

StaticContentReference_*

Actions Read
Context Both in hub and QMC
Type Read only
Conditions resource.AppContents.App.HasPrivilege("Read")

ReadAppContents

ReadAppContents security rule properties
Property Details
Name ReadAppContents
Description If you have read rights on the app you should be able to read app content belonging to that app
Resource filter

App.Content_*

Actions Read
Context Both in hub and QMC
Type Read only
Conditions resource.App.HasPrivilege("read")

ReadAppDataSegments

ReadAppDataSegments security rule properties
Property Details
Name ReadAppDataSegments
Description If you have read rights on the app you should be able to read app data segments belonging to that app
Resource filter

App.DataSegment_*

Actions Read
Context Both in hub and QMC
Type Read only
Conditions resource.App.HasPrivilege("read") and !user.IsAnonymous()

ReadAppInternals

ReadAppInternals security rule properties
Property Details
Name ReadAppInternals
Description If you have read rights on the app you should be able to read app internals belonging to that app
Resource filter

App.Internal_*

Actions Read
Context Both in hub and QMC
Type Read only
Conditions resource.App.HasPrivilege("read")

ReadContentCacheControl

ReadContentCacheControl security rule properties
Property Details
Name ReadContentCacheControl
Description Read-access to parent content library should also give read-access to referencing content cache controls.
Resource filter

ContentCacheControl_*

Actions Read
Context Both in hub and QMC
Type Default
Conditions

((user.roles="ContentAdmin" or user.roles="SecurityAdmin" or resource.contentLibrary.HasPrivilege("read")))

ReadCustomProperties

ReadCustomProperties security rule properties
Property Details
Name ReadCustomProperties
Description Non-anonymous users can read custom property definitions and values
Resource filter

CustomProperty*

Actions Read
Context Both in hub and QMC
Type Default
Conditions !user.IsAnonymous()

ReadOdagLinks

ReadOdagLinks security rule properties
Property Details
Name ReadOdagLinks
Description Non-anonymous users can read ODAG links
Resource filter

OdagLink_*

Actions Read
Context Only in hub
Type Default
Conditions !user.IsAnonymous()

ReadOdagLinkUsage

ReadOdagLinkUsage security rule properties
Property Details
Name ReadOdagLinkUsage
Description Non-anonymous users with read access to the selection app can read its OdagLinkUsages
Resource filter

OdagLinkUsage_*

Actions Read
Context Only in hub
Type Default
Conditions !user.IsAnonymous() and resource.selectionApp.HasPrivilege("read")

RootAdmin

RootAdmin security rule properties
Property Details
Name RootAdmin
Description Root admin should have full access rights
Resource filter

*

Actions

Create, Read, Update, Delete, Export, Publish, Change owner, Change role, Export data, Access offline, Duplicate, Approve

Context Only in QMC
Type Read only
Conditions ((user.roles="RootAdmin"))

SecurityAdmin

SecurityAdmin security rule properties
Property Details
Name SecurityAdmin
Description Security admin should have access rights to security related entities
Resource filter

Stream_*,App*,Proxy*,VirtualProxy*,User*,SystemRule_*,CustomProperty*,Tag_*,DataConnection_*, ContentLibrary_*,FileExtension_*,FileExtensionWhiteList_*,Deployment_*, IdentityProviderSettings_*,CustomBannerMessage_*

Actions

Create, Read, Update, Delete, Export, Publish, Change owner,Duplicate, Approve

Context Only in QMC
Type Default
Conditions ((user.roles="SecurityAdmin"))

SecurityAdminQmcSections

SecurityAdminQmcSections security rule properties
Property Details
Name SecurityAdminQmcSections
Description Security admin should have access rights to security related sections
Resource filter

License_*,TermsAcceptance_*,ServiceStatus_*,QmcSection_Stream,QmcSection_App, QmcSection_App.Object,QmcSection_AppDistributionStatus,QmcSection_CloudDistribution,QmcSection_SystemRule, QmcSection_DataConnection,QmcSection_Tag,QmcSection_Templates,QmcSection_Audit,QmcSection_ProxyService,QmcSection_VirtualProxyConfig,QmcSection_User,QmcSection_CustomPropertyDefinition, QmcSection_Certificates,QmcSection_Certificates.Export,QmcSection_ContentLibrary, QmcSection_AnalyticConnection,QmcSection_DeploymentSetup,QmcSection_CustomBannerMessage,QmcSection_EngineHealth

Actions

Read

Context Only in QMC
Type Default
Conditions ((user.roles="SecurityAdmin"))

SecurityAdminReadOnly

SecurityAdminReadOnly security rule properties
Property Details
Name SecurityAdminReadOnly
Description Security admin should have Read access rights to security related entities
Resource filter

EngineHealth_*

Actions

Read

Context Only in QMC
Type Default
Conditions ((user.roles="SecurityAdmin"))

SecurityAdminServerNodeConfiguration

SecurityAdminServerNodeConfiguration security rule properties
Property Details
Name SecurityAdminServerNodeConfiguration
Description Security admin should have read rights to the ServerNodeConfiguration entity
Resource filter

ServerNodeConfiguration_*

Actions

Read

Context Only in QMC
Type Default
Conditions ((user.roles="SecurityAdmin"))

ServiceAccount

ServiceAccount security rule properties
Property Details
Name ServiceAccount
Description The service accounts should be able to do all actions
Resource filter

*

Actions

Create, Read, Update, Delete, Export, Publish, Change owner, Change role, Export data, Access offline, Duplicate, Approve

Context Both in hub and QMC
Type Read only
Conditions ((user.UserDirectory="INTERNAL" and user.UserId like "sa_*"))

Shared content manage content

Shared content manage content security rule properties
Property Details
Name Shared content manage content
Description Allows everyone that can update a shared content to manage its corresponding files
Resource filter

StaticContentReference_*

Actions

Create, Read, Update, Delete

Context Both in hub and QMC
Type Read only
Conditions resource.SharedContents.HasPrivilege("Update")

Shared content see content

Shared content see content security rule properties
Property Details
Name Shared content see content
Description Allows everyone that can see a shared content to see its corresponding files
Resource filter

StaticContentReference_*

Actions

Read

Context Both in hub and QMC
Type Read only
Conditions resource.SharedContents.HasPrivilege("Read")

Stream

Information noteIt is not recommended to create rules that allow users to edit published apps in streams.
Stream security rule properties
Property Details
Name Stream
Description

The user should see the resource if he/she has read access to the stream it is published to

Resource filter

App*

Actions

Read

Context Both in hub and QMC
Type Default
Conditions (resource.resourcetype = "App" and resource.stream.HasPrivilege("read")) or ((resource.resourcetype = "App.Object" and resource.published ="true" and resource.objectType != "app_appscript" and resource.objectType != "loadmodel") and resource.app.stream.HasPrivilege("read"))

StreamEveryone

StreamEveryone security rule properties
Property Details
Name StreamEveryone
Description The default stream called Everyone should be visible for all users and all users should be able to publish to it
Resource filter

Stream_<stream_ID>

Actions

Read, Publish

Context Both in hub and QMC
Type Default
Conditions !user.IsAnonymous()

StreamEveryoneAnonymous

StreamEveryoneAnonymous security rule properties
Property Details
Name StreamEveryoneAnonymous
Description The default stream called Everyone should be visible for anonymous users
Resource filter

Stream_<stream_ID>

Actions

Read

Context Only in hub
Type Default
Conditions user.IsAnonymous()

StreamMonitoringAppsPublish

StreamMonitoringAppsPublish security rule properties
Property Details
Name StreamMonitoringAppsPublish
Description RootAdmin, ContentAdmin, and SecurityAdmin should be able to publish to the default stream called Monitoring apps
Resource filter

Stream_<stream_ID>

Actions

Publish

Context Only in hub
Type Default
Conditions ((user.roles="RootAdmin" or user.roles="ContentAdmin" or user.roles="SecurityAdmin"))

StreamMonitoringAppsRead

StreamMonitoringAppsRead security rule properties
Property Details
Name StreamMonitoringAppsRead
Description The default stream called Monitoring apps should be visible for default Administrators
Resource filter

Stream_<stream_ID>

Actions

Read

Context Both in hub and QMC
Type Default
Conditions ((user.roles="RootAdmin" or user.roles="ContentAdmin" or user.roles="SecurityAdmin" or user.roles="DeploymentAdmin" or user.roles="AuditAdmin"))

Temporary content

Temporary content security rule properties
Property Details
Name Temporary content
Description Allows everyone except anonymous users to create temporary content
Resource filter

TempContent_*

Actions

Create

Context Both in hub and QMC
Type Read only
Conditions !user.IsAnonymous()

UpdateAppContentFiles

UpdateAppContentFiles security rule properties
Property Details
Name UpdateAppContentFiles
Description Allows everyone that can update an app to manage its content files
Resource filter

StaticContentReference_*

Actions

Create, Read, Update, Delete

Context Both in hub and QMC
Type Read only
Conditions resource.AppContents.App.HasPrivilege("Update")

UpdateAppContents

UpdateAppContents security rule properties
Property Details
Name UpdateAppContents
Description If you have update rights on the app you should be able to update app content belonging to that app
Resource filter

App.Content_*

Actions

Update

Context Both in hub and QMC
Type Read only
Conditions resource.App.HasPrivilege("update")

UpdateAppDataSegments

UpdateAppDataSegments security rule properties
Property Details
Name UpdateAppDataSegments
Description If you have update rights on the app you should be able to create/update/read/delete app data segments belonging to that app
Resource filter

App.DataSegment_*

Actions

Create, Read, Update, Delete

Context Both in hub and QMC
Type Read only
Conditions resource.App.HasPrivilege("update") and !user.IsAnonymous()

UpdateAppInternals

UpdateAppInternals security rule properties
Property Details
Name UpdateAppInternals
Description If you have update rights on the app you should be able to create/update/read/delete app internals belonging to that app
Resource filter

App.Internal_*

Actions

Create, Read, Update, Delete

Context Both in hub and QMC
Type Read only
Conditions resource.App.HasPrivilege("update")

Did this page help you?

If you find any issues with this page or its content – a typo, a missing step, or a technical error – let us know how we can improve!