Read only role The read-only role (snc_read_only) restricts a user or a group of users to read-only access on the tables to which the user already has access. This role is not intended to be the only role a user has. It is intended to be an extra role to restrict insert, update, and delete operations on the tables that the user can access as defined by the other roles. After you assign this role to a user, they can no longer can create, update, or delete records on ANY tables. Note: Assign this role only to users. Do not assign this role to other resources in the system, including applications, ACLs, and so on. The snc_read_only role can be assigned to any user as a simple way to limit access to data without having to create ACLs for system and custom tables and fields. This practice is useful for performing internal or external audits without allowing a user to have insert or update access to data. Users with the snc_read_only role have the following restrictions regardless of other roles and privileges they have. Cannot insert, update, or delete records from the UI or when using the GlideRecord API. Cannot activate or upgrade plugins. Cannot directly run SQL. Cannot upload XML files. Can only run background scripts when on an instance in the public sandbox environment. Note: These role restrictions are in place even if impersonating another user with write access such as an admin. Activate the read only roleAn administrator can activate the Read Only User Role (com.snc.read_only.role) plugin if it is not already active.Read only role propertiesThese system properties control the snc_read_only role. The following default values are used for the properties.Log on with the read only roleUsers logging into a production instance should log in using the snc_read_only role to prevent unwanted modifications to the instance data.