Chapter 5. Users and Privileges

In this chapter, we will explore the following concepts:

  • Documentum security at a high level
  • Users and authentication
  • User authorization including privileges and client capabilities
  • User management with DA

Documentum security

At a high level, the security model in Documentum is similar to that used in contemporary enterprise applications. There are resources (information, objects) that need to be secured, there are operations that can be performed on the resources, and there are users who wish to perform these operations. The security configuration defines what is allowed for various combinations of users, operations, and resources. At run time, a user attempts to perform an operation and the components of the Documentum ...

Get Documentum 6.5 Content Management Foundations now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.