Exploring Access Control List
-
- UpdatedAug 3, 2023
- 7 minutes to read
- Vancouver
- Platform Security
Explore Access Control List (ACL).
Components of ACLs
- The object and operation being secured
- The permissions required to access the object
The object is the target to which access needs to be controlled. Each object consists of a type and name that uniquely identifies a particular table, field, or record.
For example, all these entries specify an object:
Type | Name | Object secured |
---|---|---|
record | [incident].[-- None --] | The Incident table. |
record | [incident].[active] | The Active field in the Incident table. |
REST_Endpoint | user_role_inheritance | The record for the user_role_inheritance Scripted REST API. |
Each operation describes a valid action the system can take on the specified object. Some objects, such as records, support multiple operations, while other objects, such as a REST_Endpoint, only support one operation.
For example, all these entries specify an operation:
Type | Name | Operation | Operation secured |
---|---|---|---|
record | [incident].[-- None --] | create | Creating records in the Incident table. |
record | [incident].[active] | write | Updating the Active field in the Incident table. |
REST_Endpoint | user_role_inheritance | execute | Running the user_role_inheritance scripted REST API. |
- One or more user roles to the Requires role list.
- One or more conditions.
- A script that evaluates to true or false or sets the
answer
variable to true or false.
To gain access to an object and operation, a user must pass all permissions listed in an access control. For example, this access control restricts access to view operations on the incident table.
To update a record in the incident table, a user must have the listed roles and the record must meet the condition.
Permission type | Requirement | Description |
---|---|---|
Requires role | Requires role:itil | Only allow users with the itil role to update incidents. |
Condition | [Incident state] [is not] [Closed] | Only allow updates to active incident records. |
ACL evaluation process
An ACL rule only grants a user access to an object if the user meets all of the permissions required by the matching ACL rule.
- The condition must evaluate to true.
- The script must evaluate to true or return an answer variable with the value of true.
- The user must have one of the roles in the required roles list. If the list is empty, this condition evaluates to true.
- [Record ACL rules only] The matching table-level and field-level ACL rules must both evaluate to true.

Whenever a session requests data, the system searches for access control rules that match the requested object and operation. If there is a matching access control rule, then the system evaluates if the user has the permissions required to access the object and operation. If an access control rule specifies more than one permission, then the user must meet all permissions to gain access to the object and operation. Failing any one permission check prevents the user from accessing the matching object and operation.
The effects of being denied access to an object depend on the ACL rule that the user failed. For example, failing a read operation ACL rule prevents the user from seeing the object. Depending on the object secured, the ACL rule hides a field on a form, hides rows from a list, or prevents a user from accessing a UI page. The following table contains complete list of results of failing an ACL rule for a given operation and object type.
Pre and post query ACL checks
- Pre-query ACL check
Before your instance runs a database query, it checks ACL rules for each field in the queried table to determine which fields a user may access. This check only looks at the user's roles, and checks to see if these roles allow access to fields. Because this check runs before the query, the ACL doesn't have access to the records on the table, so it cannot take that data into account. Scripts and conditions that rely on knowing contents of a record are not evaluated.
If the user doesn't have read access at this point, the value for the field is not shown to the user.
- Post-query ACL check
After the query, your instance checks each record returned by the query. During this check, there is context for the ACL, so the role, condition, and script portions of the ACL are evaluated. If the user doesn't have read access at this point, the value for the field is not shown to the user, however the user will see the field label if their roles allow access to the field.
ACL matching requirements for objects
Object Type | Matching ACL Rules Required to Access Object | Existing Wildcard ACL Rules |
---|---|---|
Client-callable script includes | Users must meet the permissions of two ACL rules:
|
By default, there are no wildcard (*) rules for these object types. If you create a wildcard ACL rule for one of these objects, then the ACL rule applies to all objects of this type. |
Processors | ||
UI pages | Users must meet the permissions of two ACL rules:
|
By default, there are wildcard table rules (*) for the create, read, write, and delete operations and wildcard field rules (*.*) for the personalize_choices, create, and save_as_template operations. When you create a new table, create new ACL rules for the table unless you want to use the provided wildcard ACL rules. |
Record |
Multiple ACL rules at the same point in the processing order
If two or more rules match at the same point in the processing order, the user must pass any one of the ACL rules permissions to access the object. For example, if you create two field ACL rules for incident.number, then a user who passes one rule has access to the number field regardless of whether the user failed any other field ACL rule at the same point in the processing order.
Required role
Normal admin users can view and debug access control rules. However, to create or update existing access control rules, administrators must elevate privileges to the security_admin role. See Elevate to a privileged role for instructions.
ACL rules in scoped applications
You can create ACL rules for objects in the same scope as the ACL rule and for tables with at least one field that is in the same scope as the ACL rule.
- You can create an ACL rule for any table, UI page, or other object that is in the same scope as the ACL rule.
- You can create an ACL for a field that is in the same scope as the ACL rule.
- If the table is in the same scope, you can use a script to evaluate permissions.
- If the table is in a different scope, you cannot use a script to evaluate permissions.
- You cannot create or modify ACL rules for objects that are in a different scope than the application you have selected in the application picker, including adding a role to an ACL in a different scope.
- You can create wildcard table rules (*) only in the global scope.
- You can create wildcard field rules (*) only for tables in the same scope as the ACL rule.