Sample Security ScenariosSave PDFSave selected topicSave selected topic and subtopicsSave all topicsShareShare to emailCopy topic URLPrintLast Updated: May 20, 20261 minute readMarkLogic ServerVersion 12.0Documentation This section describes some common scenarios for defining security policies in your applications. The scenarios shown here are by no means exhaustive. There are many possibilities for how to set up security in your applications. ContentsProtecting the Execution of XQuery ModulesChoosing the Access Control for an ApplicationImplementing Security for a Read-Only User
This section describes some common scenarios for defining security policies in your applications. The scenarios shown here are by no means exhaustive. There are many possibilities for how to set up security in your applications. ContentsProtecting the Execution of XQuery ModulesChoosing the Access Control for an ApplicationImplementing Security for a Read-Only User
This section describes some common scenarios for defining security policies in your applications. The scenarios shown here are by no means exhaustive. There are many possibilities for how to set up security in your applications. ContentsProtecting the Execution of XQuery ModulesChoosing the Access Control for an ApplicationImplementing Security for a Read-Only User