Skip to main content

Managing Security and Workflows

  • Chapter
The Definitive Guide to Plone
  • 273 Accesses

Abstract

Zope has a very powerful and granular security architecture, and Plone of course inherits this structure. This chapter shows how security settings are handled in the Zope application sever. Most of the concepts in this chapter are related to Zope users and permissions management, but as you saw in Chapter 4’s “Managing Users and Permissions” section, you can also manage users, groups, and permissions through the Plone interface. If you have to work with simple settings, you should always work at the Plone level and use its tools for user management, security, and permission settings instead of working in the ZMI.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Redomino SRL and Andy McKay

About this chapter

Cite this chapter

(2009). Managing Security and Workflows. In: The Definitive Guide to Plone. Apress. https://doi.org/10.1007/978-1-4302-1894-4_7

Download citation

Publish with us

Policies and ethics