Use read only attributes in XPath constraints

Check ID
DOM_0002

Category

Security

Summary

XPath constraints are used in security access rules to limit the data that a user can view or manage. It is important however that a user does not have read/write access to any of the attributes or associations used in the XPath constraint because otherwise they can change these values and circumvent the XPath constraint.

Options

This check does not have any options.

Pass

User roles don't have read/write access to any attributes or associations used in XPath constraints for that role.

Fail

User roles have read/write access to an attribute or association used in one or more XPath constraints for that role.

Last updated