Runtime access tracking
-
- UpdatedJan 30, 2025
- 1 minute read
- Yokohama
- Building applications
Runtime access tracking allows administrators to manage script access to application resources by creating a list of script operations and targets that the system authorizes to run.
Runtime access tracking provides the following options:
Option | Tracking done | Authorization done | Results |
---|---|---|---|
None | The system does not track runtime access requests. | The system does not require authorization to run access requests. | Application scripts can access resources from other applications as long as the table-level access settings allow it. |
Tracking | During development, the system creates a Cross-Scope Privilege record for each runtime access request. After installation, the system no longer tracks new runtime access requests. |
The system sets the status of the Cross-Scope Privilege record to Allowed. | The system runs the tracked operation as long as the table-level access settings allow it. |
Enforcing | During development, the system creates a Cross-Scope Privilege record for each runtime access request. After installation, the system no longer tracks new runtime access requests. |
The system sets the status of the Cross-Scope Privilege record to Requested. | The system blocks the tracked operation from running until an Administrator manually changes the status to Allowed and the table-level access settings allow it. |
During development, application designers must run all of an application's script logic to ensure the system tracks and authorizes the access requests to other applications.