5.3 Implementation Patterns for Access Controls
161
5.3.1 Implement Access Controls with Path Expressions
161
5.3.2 Inherit Implementation of Access Controls
170
5.3.3 Implement Access Controls without Using Authorization Objects
178
5.3.4 Implement Access Controls for Analytical Queries
183
5.3.5 Implement Access Controls on the Field Level
185
5.3.6 Change Access Controls of SAP-Delivered CDS Models
186
5.3.7 Block Standard Data Selections from CDS Models
189
5.3.8 Decouple Access Controls from User Input
191
5.3.9 Map CDS Fields onto Fields of Authorization Objects Using Indirection
193