Abstract
Zope has a very powerful and granular security architecture, and Plone of course inherits this structure. This chapter shows how security settings are handled in the Zope application sever. Most of the concepts in this chapter are related to Zope users and permissions management, but as you saw in Chapter 4’s “Managing Users and Permissions” section, you can also manage users, groups, and permissions through the Plone interface. If you have to work with simple settings, you should always work at the Plone level and use its tools for user management, security, and permission settings instead of working in the ZMI.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2009 Redomino SRL and Andy McKay
About this chapter
Cite this chapter
(2009). Managing Security and Workflows. In: The Definitive Guide to Plone. Apress. https://doi.org/10.1007/978-1-4302-1894-4_7
Download citation
DOI: https://doi.org/10.1007/978-1-4302-1894-4_7
Publisher Name: Apress
Print ISBN: 978-1-4302-1893-7
Online ISBN: 978-1-4302-1894-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books