You can use this role-based security to grant user access to reports that are based on roles.
You can access the Security configuration page by going to System administration > Security > Security configuration.
Data security is used to deny user access to tables, fields, and rows in the database. Data security uses the extensible data security framework (XDS) to control access to transactional data by assigning data security policies to security roles. These policies can restrict access to data, based on either the effective date or user data. We recommend that you use the extensible data security to help secure data.
In addition to these security options, the Table Permissions Framework can help protect data and is enforced by the Application Object Server (AOS). The Table Permissions Framework allows you to grant or deny Create, Read, Update, or Delete (CRUD) permissions to the data in a table. You can use this to give certain roles access to view and manipulate certain datasets.
Table permissions framework example
Table Permissions Framework adds table-level security that verifies user rights regardless of the request origin. For example, consider the following scenario: