Metadata-Based Security

User roles can leverage metadata-based security, which is the ability to secure objects based on metadata. This is done by selecting the Edit Query option for Record Access and configuring the security as desired.

Example

Step 1

Navigate to User Roles in the security administration, and open a role that needs to be configured.

Step 1: Modify the Record Access query

Step 2

A report appears, where the filter can be edited; modify the filter and save.Step 2: Modify the filter

Step 3:Test

While other users can view the full list of contacts, signing in with the talent manager role will only show Pierce in the list.

The unrestricted list of contacts

The security-restricted list based on metadata