XPath constraints are used in security access rules to limit the data that a user can view or manage. It is important however that a user does not have read/write access to any of the attributes or associations used in the XPath constraint because otherwise they can change these values and circumvent the XPath constraint.