O'Reilly logo

Professional Plone Development: Building robust, content-centric web applications with Plone 3, an open source Content Management System by Martin Aspeli

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Security and Workflow

Security should never be an afterthought, particularly when building web applications. Luckily, Zope and Plone provide a robust and flexible security model that lets you concentrate on building your application instead of worrying too much about how to lock it down. That is, so long as you understand a few basics.

In this chapter, we will explain the building blocks of Zope security—users, roles, and permissions—as well as workflows, the usual way to manage permissions in Plone. As a demonstration, we will build a custom workflow for the Optilux website and add it to the policy product we created in the previous chapter.

Security Primitives

Zope’s security is declarative. Views, actions, and attributes on content ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required