{"id":62903,"date":"2021-01-11T10:07:52","date_gmt":"2021-01-11T15:07:52","guid":{"rendered":"http:\/\/mendix.local\/evaluation-guide\/enterprise-capabilities\/runtime-security\/"},"modified":"2025-10-09T15:15:10","modified_gmt":"2025-10-09T19:15:10","slug":"runtime-security","status":"publish","type":"evaluation_guide","link":"https:\/\/www.mendix.com\/evaluation-guide\/security\/runtime-security\/","title":{"rendered":"Runtime Security"},"excerpt":{"rendered":"<p>Learn about Mendix Runtime security, including how Mendix handles security threats, how to assign user roles, how to assign permissions, and other security concerns.<\/p>\n","protected":false},"author":118,"featured_media":0,"parent":62899,"menu_order":0,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":""},"class_list":["post-62903","evaluation_guide","type-evaluation_guide","status-publish","hentry","page"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.mendix.com\/wp-json\/wp\/v2\/evaluation_guide\/62903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mendix.com\/wp-json\/wp\/v2\/evaluation_guide"}],"about":[{"href":"https:\/\/www.mendix.com\/wp-json\/wp\/v2\/types\/evaluation_guide"}],"author":[{"embeddable":true,"href":"https:\/\/www.mendix.com\/wp-json\/wp\/v2\/users\/118"}],"version-history":[{"count":1,"href":"https:\/\/www.mendix.com\/wp-json\/wp\/v2\/evaluation_guide\/62903\/revisions"}],"predecessor-version":[{"id":250377,"href":"https:\/\/www.mendix.com\/wp-json\/wp\/v2\/evaluation_guide\/62903\/revisions\/250377"}],"up":[{"embeddable":true,"href":"https:\/\/www.mendix.com\/wp-json\/wp\/v2\/evaluation_guide\/62899"}],"wp:attachment":[{"href":"https:\/\/www.mendix.com\/wp-json\/wp\/v2\/media?parent=62903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}