Chapter 5. Users and Privileges
In this chapter, we will explore the following concepts:
- Documentum security at a high level
- Users and authentication
- User authorization including privileges and client capabilities
- User management with DA
At a high level, the security model in Documentum is similar to that used in contemporary enterprise applications. There are resources (information, objects) that need to be secured, there are operations that can be performed on the resources, and there are users who wish to perform these operations. The security configuration defines what is allowed for various combinations of users, operations, and resources. At run time, a user attempts to perform an operation and the components of the Documentum ...