<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Process Model</title><link>https://community.appian.com/discussions/f/general/24650/process-model</link><description>1.What is the difference between Run as whoever started this Process and Run as whoever designed the Process Model ? 
 Pls explain</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: Process Model</title><link>https://community.appian.com/thread/95298?ContentTypeID=1</link><pubDate>Thu, 19 May 2022 17:29:12 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:c7e43204-c68e-4ebd-a50f-763bbd0cec91</guid><dc:creator>davel001150</dc:creator><description>&lt;p&gt;Yep, I would say in general rule of thumb is to use user credentials as much as possible.&amp;nbsp; If it absolutely cannot possibly work unless you set it to run as whoever designed this PM, then you may use that feature.&lt;/p&gt;
&lt;p&gt;You have the potential to allow for&amp;nbsp;v&lt;span&gt;ertical&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span class="povykd"&gt;&lt;span class="JPfdse"&gt;privilege escalation attacks if you abuse it or utilize it too much.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Process Model</title><link>https://community.appian.com/thread/95295?ContentTypeID=1</link><pubDate>Thu, 19 May 2022 16:20:53 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:1d8be732-8610-42d7-a136-503a547078f6</guid><dc:creator>Stefan Helzle</dc:creator><description>&lt;p&gt;Adding to this, I recommend to try to not use this configuration except of very rare cases. The reason is, that the process model is typically deployed to the production environment by a technical user which is of type system admin.&lt;/p&gt;
&lt;p&gt;When you now configure a node to run in the designer context, you basically run this node with unlimited permissions.&lt;/p&gt;
&lt;p&gt;Use this only for nodes which explicitly need that, like Create Group.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Process Model</title><link>https://community.appian.com/thread/95294?ContentTypeID=1</link><pubDate>Thu, 19 May 2022 15:38:26 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:efe7206f-1f82-41bd-a32a-e4ad5db1db19</guid><dc:creator>davel001150</dc:creator><description>&lt;p&gt;1.&amp;nbsp; You&amp;#39;re taking essentially no effort to not show this is an interview or test question.&lt;/p&gt;
&lt;p&gt;When you run as whoever started this Process, you&amp;#39;re using your own credentials.&amp;nbsp; So if the user who clicked the action or related action, or however the process got started can&amp;#39;t do the particular thing, it can&amp;#39;t be done.&amp;nbsp; This enforces security and is good in some situations.&amp;nbsp; However, you&amp;#39;ll find that users frequently aren&amp;#39;t allowed to do much at all; security can be very, very tight.&amp;nbsp; Run as whoever designed this process model let&amp;#39;s you do a lot more if the person who designed the process model was a System Administrator, for instance.&amp;nbsp; In the cases where you need to, you still define security by defining who can start the process model.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>