glide.ui.permitted_tables
ServiceNow property description:
List of system tables (beginning with "sys_", comma separated), that are reportable. By default, system tables are not reportable.
Attributes
- Sys ID: c3dee8670a0a0aa70064b48de5ad973e
- Type: string
- Application: Global
- Default value: sys_db_object,sys_user,sys_audit,sys_user_group,sys_user_grmember,sys_dictionary,sysapproval_approver,sys_user_has_role,sys_group_has_role,sys_user_delegate,sys_report_page_hdrftr,sysapproval_group,sys_api_stats,sys_api_stats_requestor,sys_api_stats_requestor_monthly,v_api_stats_requestor,sys_portal_page,sys_report,sys_alias,sys_complex_object_output_strategy,sys_upgrade_history_log,sys_hub_flow,sys_hub_action_type_definition,sys_aw_master_config,sys_ux_app_config,sys_ui_page,sys_ux_page_registry,sys_user_has_license,sys_di_task

My personal property description:
The glide.ui.permitted_tables property in ServiceNow controls which system tables (starting with "sys") can be used for reporting. By default, most system tables are excluded to prevent performance issues. Administrators can add or remove tables from this list by editing the property. This allows specific system tables to be used for reports, but caution is needed to avoid exposing sensitive data or impacting system performance.

AI generated property description:
The ServiceNow property `glide.ui.permitted_tables` is used to control which system tables can be reported on. By default, certain system tables are restricted from reporting to protect sensitive data and maintain system performance. This property allows administrators to specify a comma-separated list of additional tables that can be included in reporting. It is important to use this property cautiously, as enabling reporting on certain system tables can expose sensitive information or impact system performance. The documentation emphasizes the need to understand the implications of allowing reporting on these tables before making changes to this property.
Source