Limitations
- Last Updated: May 20, 2026
- 1 minute read
- MarkLogic Server
- Version 12.0
- Documentation
-
In the MarkLogic Server Role-Based Security Model, the
updatecapability includes thenode-updateandinsertcapabilities. However, in QBAC, this is not so: a role or user query that has theupdatecapability does not also have thenode-updateand theinsertcapabilities. In QBAC, these three capabilities are strictly separate: operations that neednode-updatecapability must specifynode-update, those that needinsertcapability must specifyinsert, and those that needupdatecapability must specifyupdate. For more details on the capabilities needed on certain operations, see Capabilities Associated through Permissions. -
Always include default permissions when inserting a document--even if you plan to access this document only through QBAC.
-
Users with QBAC document access are not able to read document properties. This is a design limitation. Users with QBAC document access do not have properties access by default, unless the QBAC query explicitly matches document properties through a CTS query. However, QBAC access to document properties gives access to the document itself by default.
-
Queries run unfiltered. If a query has false positives that means that access may be granted where it is not intended to.
-
It is not recommended to use expensive QBAC queries (for example, wildcards with lexicon expansion), since they run on every database request.
-
Queries may depend on specific indexes (for example, range queries). If those indexes are deleted, the queries will fail and will lead to denial of access.
-
Configuration of QBAC queries is through security APIs and RMAs only. See the RMAs for configuring roles and users at
/11.0/REST/POST/manage/v2/rolesand/11.0/REST/POST/manage/v2/users.