Security rules
The Qlik Sense system includes an attribute-based security rules engine that uses rules as expressions to evaluate what type of access a user or users should be granted for a resource.
The Security rules overview lists all the available security rules. You can manage your security rules by performing a number of actions, as described in the following:
Name | The name of the rule. Names for generated rules have the following syntax: [resource type]_[access type]_[resource name] |
Description | A description of the rule. |
Resource filter |
The type of resource that the rule applies to. An asterisk (*) indicates that the rule applies to all resources. For generated rules the Resource column includes the ID for the rule. |
Status | The security rule can be Enabled or Disabled. |
Context | Shows if the rule is for QMC, hub, or both. |
Type | Custom , ReadOnly or Default. |
Tags | The QMC tags that are connected to the rule. |
Refreshing page: Click to manually refresh the page. | |
Sorting columns: Click to sort the list alphabetically, ascending or descending according to the nature of the column. |
|
Filtering columns: Click to open a dialog and filter the list based on that column and your filter criteria as you type. Click to remove the filter. Click outside of the filter dialog (or press the keyboard key "Esc") to close the dialog. The filter icon is inverted when a filter is applied to a column . You can apply filters to multiple columns to narrow your search. |
|
Edit | Editing security rules: Click to edit the selected security rule. |
Delete | Deleting security rules: Click to delete the selected security rules. |
Create new | Creating new security rules: Click to create a new security rule. |
Show more items |
Show more items: The overview shows a set number of items by default. To show more items, scroll to the end of the list and click Show more items. Sorting and filtering of items is always done on the full database list of items, not only the items that are on display. |
Learn more
- Designing access control
- Getting to know the security rules edit page
- Creating security rules
- Allocating user access
- Previewing how security rules affect user privileges
- Editing security rules
- Deleting security rules
- Security rule conventions
- Operands and functions for conditions
- Security rules examples
- Connecting tags
- Disconnecting tags
Did this page help you?
If you find any issues with this page or its content – a typo, a missing step, or a technical error – let us know how we can improve!