Stop Coding, Start Securing: Visually Configure Row-Level Security in Minutes!

Secure your apps with the Static Access Control Rules (SACR)

Labels
AJAX(112) App Studio(9) Apple(1) Application Builder(245) Application Factory(207) ASP.NET(95) ASP.NET 3.5(45) ASP.NET Code Generator(72) ASP.NET Membership(28) Azure(18) Barcode(2) Barcodes(3) BLOB(18) Business Rules(1) Business Rules/Logic(140) BYOD(13) Caching(2) Calendar(5) Charts(29) Cloud(14) Cloud On Time(2) Cloud On Time for Windows 7(2) Code Generator(54) Collaboration(11) command line(1) Conflict Detection(1) Content Management System(12) COT Tools for Excel(26) CRUD(1) Custom Actions(1) Data Aquarium Framework(122) Data Sheet(9) Data Sources(22) Database Lookups(50) Deployment(22) Designer(178) Device(1) DotNetNuke(12) EASE(20) Email(6) Features(101) Firebird(1) Form Builder(14) Globalization and Localization(6) How To(1) Hypermedia(2) Inline Editing(1) Installation(5) JavaScript(20) Kiosk(1) Low Code(3) Mac(1) Many-To-Many(4) Maps(6) Master/Detail(36) Microservices(4) Mobile(63) Mode Builder(3) Model Builder(3) MySQL(10) Native Apps(5) News(18) OAuth(9) OAuth Scopes(1) OAuth2(13) Offline(20) Offline Apps(4) Offline Sync(5) Oracle(11) PKCE(2) Postgre SQL(1) PostgreSQL(2) PWA(2) QR codes(2) Rapid Application Development(5) Reading Pane(2) Release Notes(184) Reports(48) REST(29) RESTful(29) RESTful Workshop(15) RFID tags(1) SaaS(7) Security(81) SharePoint(12) SPA(6) SQL Anywhere(3) SQL Server(26) SSO(1) Stored Procedure(4) Teamwork(15) Tips and Tricks(87) Tools for Excel(3) Touch UI(93) Transactions(5) Tutorials(183) Universal Windows Platform(3) User Interface(338) Video Tutorial(37) Web 2.0(100) Web App Generator(101) Web Application Generator(607) Web Form Builder(40) Web.Config(9) Workflow(28)
Archive
Blog
Thursday, May 8, 2025PrintSubscribe
Stop Coding, Start Securing: Visually Configure Row-Level Security in Minutes!

Application security, especially controlling who sees what data, is often a complex and time-consuming task. Developers traditionally wade through lines of code or repetitive configurations to implement row-level security, making it prone to errors and difficult to audit. What if you could define and test these critical data access rules visually, getting instant feedback and ensuring your application is locked down precisely as intended, all without writing a single line of server-side code for most common scenarios?

Introducing Static Access Control Rules (SACR) in Code On Time, now supercharged by the integrated App Studio 2025. We've taken the power of declarative, SQL-based security and paired it with an intuitive visual interface. Imagine defining rules like "users only see their own orders" or "managers in the Sales department can only see customers in their region" through a simple point-and-click configuration, directly within your live application preview. No more hunting through business rule files or worrying if your custom code covers every edge case for standard security patterns!

With App Studio, configuring SACR becomes a breeze. See at a glance which parts of your application are protected with clear visual cues like the "security shield" icon directly in the App Explorer. Define rules using straightforward properties, get instant feedback on their impact, and even use the "Related Items" feature to see exactly which data fields and views are affected by a specific rule. Debugging is simplified to toggling a rule's Enabled status and observing the change immediately. This visual approach not only accelerates development but also makes your security posture transparent and significantly easier to maintain.

Ready to transform how you handle data security? Stop wrestling with complex code for common security needs and embrace the power of visual configuration. Learn how to master Static Access Control Rules with our comprehensive tutorial and start building more secure applications, faster.

Click here to learn how to master Static Access Control Rules with our comprehensive tutorial.
image2.png
This access control rule is triggered by the presence of the LastName data field in the view. The framework will filter in the rows that have the trigger field value that matches the user’s name. The rule applies to the views of all existing and future data controllers of the application.
image1.png
The maroon “security shield” icon is overlaid on the relevant configuration nodes of Customers, Employees, and Orders data controllers. The icon subtly hints of the security restrictions in the application making it possible at-a-glance security check. The Access Control property group of the affected nodes contains the Triggers property with the list of relevant “trigger” fields defined in SACR.