logo

NJP

Low Code App Dev // Deep Dive (Part 8)

Import · Jun 27, 2024 · video

hello and welcome to service now's low code capability deep dive in this nine-part series we're going to take a look at the various aspects of the service now platform that Empower creators of all skill levels with the ability to rapidly build highquality scalable and easy to govern apps this next section on application Security will showcase service now platform security tools I will demonstrate how to secure application data functions and Integrations identity management op and access analyzer are tool to compare and diagnose security configurations the primary way data and platform functionality is secured in service now is by creating granular role-based Access Control lists or acl's acl's are easily created and maintained for each application so that user accounts only have access to the information and functionality they require to perform their role here I am granting access to users with the budget review role to records in the expense line item table where the expense item is greater than $500 ACLS like this one can be created with static conditions based rules or dynamic scripts ACLS are almost always secured using a role-based approach but more advanced configurations such as using security attributes are possible access controls can not only be used to manage access to tables but other platform functions can also be controlled in this ACL I'm restricting who can run reports against the data in the expense line item table sometimes viewing dashboards with aggregated report data is okay but access to individual records and their details is not our graphql and rest apis can also be secured in the same way by creating security rules for platform functions user identity management can easily be configured and connected through an ldap server or one of our partner identity Integrations such as Microsoft OCTA salepoint and Google to name a few user access management can be interrogated using access analyzer access analyzer can run one-hot user group or Ro security evaluations and even side by-side user comparisons the access results can help administrators audit individual user access group entitlements or specific role issues Creator can use access analyzer to ensure applications are deployed with the correct security rules in place so their applications data and functions are only open to legitimate users thanks for watching and join us for part nine of our series as we explore scalability and extensibility

View original source

https://www.youtube.com/watch?v=5Dd4R3U-Ovo