10 MLE Security
MLE utilizes a number of methods to support good security practices. This includes enforcing runtime state isolation, system and object privileges, and providing monitoring options.
Topics
- System and Object Privileges Required for Working with JavaScript in MLE
Depending on the project's requirements, different privileges can be granted to users and or roles, allowing them to interact with JavaScript in the database. - Security Considerations for MLE
Besides the use of account privileges, MLE employs several other methods to ensure a high level of security. - JavaScript Security Best Practices
Details concerning the best practices when using features of MLE with JavaScript are described. - MLE Security Examples
Example scenarios are used to demonstrate security features used by MLE. The examples use a varying degree of separation between MLE modules, environments, and the necessary grants to enable the utilized functionality.