You can study these examples to become familiar with Security. You can browse them to get the basic idea, but we encourage you to read about Authentication and Authorization before you study them carefully.
Here we ensure that Guests (authorized for the Guest role) do not see orders for secret parts such as Stealth Bolts. The entire predicate (partially hidden above) is a correlated sub query:
Each General User is assigned the General Role, which filters orders based on their amount. The exact amount for each user is specified by a Global Value, reference from the Role Predicate.
You commonly assign a Global to a user-based rows, as shown in this example.
This Auth Token defines a Global Value
This user is assigned to the General User Role, which specifies the following Permission for the orders table. Observe the use of the