User Access Rights

Dynamic Actions

Estimated reading: 2 minutes 8 views

Dynamic Actions are runtime security controls that dynamically modify application object properties based on user permissions.

They allow organizations to enforce permissions directly within the user interface — without modifying the application code.

With Dynamic Actions, you can:

  • Disable menu items
  • Hide or show fields
  • Make fields read-only
  • Enable or disable buttons
  • Restrict access to specific application features

These actions are fully independent of the application’s source code. They are defined and stored within Visual Guard (VG) and automatically applied at run-time by Visual Guard.

This ensures centralized, flexible, and scalable access control.


How Dynamic Actions Work

Dynamic Actions follow a structured security hierarchy:

  1. Permissions are created in Visual Guard.
  2. Permissions are grouped into Permission Sets.
  3. Permission Sets are assigned to Roles.
  4. Roles are assigned to Users.
  5. At login, Visual Guard evaluates permissions and dynamically updates the interface.

When a user accesses the application:

  • Visual Guard checks assigned permissions.
  • Object properties are updated dynamically.
  • Unauthorized elements are hidden, disabled, or restricted.

Key Benefits of Dynamic Actions

🔐 Code-Independent Security Enforcement

Dynamic Actions operate independently from the application’s codebase. Security rules can be modified without development changes or redeployment.

This reduces risk, improves flexibility, and simplifies long-term maintenance.

⚡ Real-Time Runtime Access Control

All UI modifications are applied at runtime. The application automatically adapts to the logged-in user’s permissions.

This ensures immediate enforcement of access rights without system downtime.

🎯 Fine-Grained Permission Management

Dynamic Actions enable fine-grained permissions to control access to:

  • Specific menus
  • Buttons
  • Fields
  • Application features
  • Sensitive data components

This level of precision helps organizations enforce strict security policies aligned with business requirements.

🛠 Centralized Security Configuration

All Dynamic Actions are defined and stored within Visual Guard. Administrators can manage permissions from a centralized console.

This simplifies governance, improves visibility, and enhances security consistency across applications.

📊 Improved Compliance and Auditability

Because permissions are structured and centrally managed, it becomes easier to:

  • Track access control rules
  • Demonstrate compliance
  • Audit user-level permissions
  • Maintain secure access governance