Enforcing Apex Security With Sharing Keywords

Security is a major foundation of the Force.com platform. Not only is security available declaratively but it is also baked into the Apex language itself. Most Apex scripts run in system context without respect to the current users permissions, sharing rules and field level security. This ensures that triggers and web services have access to all records in the org which is usually a good thing.

However, to ensure that you don't expose sensitive data to unauthorized users, you can specify that an Apex script does enforce the running user's row-level security by using the with sharing keywords when declaring your class. This doesn’t enforce the user's permissions and field-level security. Apex code always has access to all fields and objects in an organization, ensuring that code won’t fail to run because of hidden fields or objects for a user. The with sharing keywords can affect SOQL and SOSL queries as well as DML operations so be careful.

public with sharing class MyClass {
  // implement awesome code here

You can also use the without sharing keywords to ensure that Apex scripts do not enforce the sharing rules of the running user.

public without sharing class MyClass {
  // implement awesome code here

It's best practices to use these keywords with declaring new classes as if they are not used, the current sharing rules remain in effect. For example, if a class without sharing keywords specified is called by another class, then the sharing is enforced by the first class.

You can also declare inner classes and outer classes as with sharing as well. The sharing setting applies to all code contained in the class, including initialization code, constructors, and methods but inner classes do not inherit the sharing setting from their container class.

Once exception is executeAnonymous and Chatter in Apex which always executes using the full permissions of the current user.

See the Apex Developer Guide on enforcing sharing rules for more info.

Loading comments...