Security Profiles are used to prevent the application from performing actions that may be potentially dangerous for the operation of the server cluster.

A cluster administrator can assign any infobase one of the security profiles available in the cluster. In that case, the application’s potentially dangerous functionality is limited within the bounds described in the selected profile.

EN 04 Security Profiles.png

By default (immediately after creation), a security profile forbids all potentially dangerous actions. These include: 

●       Accessing the server file system.

●       Launching COM objects.

●       Using external 1C:Enterprise components.

●       Running external data processors and reports.

●       Starting applications installed on the server.

●       Accessing Internet resources. 

Therefore, protecting against unwanted actions by an unfamiliar application is straightforward: create an empty security profile and assign it to the infobase. After that, if necessary, you can broaden this profile by listing the actions that the application is allowed to perform.

Be the first to know tips & tricks on business application development!

A confirmation e-mail has been sent to the e-mail address you provided .

Click the link in the e-mail to confirm and activate the subscription.