Managing Security and Workflows


Zope has a very powerful and granular security architecture, and Plone of course inherits this structure. This chapter shows how security settings are handled in the Zope application sever. Most of the concepts in this chapter are related to Zope users and permissions management, but as you saw in Chapter 4’s “Managing Users and Permissions” section, you can also manage users, groups, and permissions through the Plone interface. If you have to work with simple settings, you should always work at the Plone level and use its tools for user management, security, and permission settings instead of working in the ZMI.


Destination State Content Type Anonymous User Security Architecture Private State 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Redomino SRL and Andy McKay 2009

Personalised recommendations