O'Reilly logo

Documentum 6.5 Content Management Foundations by Pawan Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Users and Privileges

In this chapter, we will explore the following concepts:

  • Documentum security at a high level
  • Users and authentication
  • User authorization including privileges and client capabilities
  • User management with DA

Documentum security

At a high level, the security model in Documentum is similar to that used in contemporary enterprise applications. There are resources (information, objects) that need to be secured, there are operations that can be performed on the resources, and there are users who wish to perform these operations. The security configuration defines what is allowed for various combinations of users, operations, and resources. At run time, a user attempts to perform an operation and the components of the Documentum ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required