5.3 Implementation Patterns for Access Controls
171
5.3.1 Implement Access Controls with Path Expressions
171
5.3.2 Inherit Implementation of Access Controls
180
5.3.3 Implement Access Controls without Using Authorization Objects
189
5.3.4 Implement Access Controls for Analytical Queries
194
5.3.5 Implement Access Controls for Transactional Applications
196
5.3.6 Implement Access Controls on the Field Level
199
5.3.7 Change Access Controls of SAP-Delivered CDS Models
200
5.3.8 Block Standard Data Selections from CDS Models
203
5.3.9 Decouple Access Controls from User Input
205
5.3.10 Map CDS Fields onto Fields of Authorization Objects Using Indirection
207