In this chapter we have taken a look at Plone’s approach to security, including:
- Key concepts such as users, groups, roles, and permissions
- Some examples of how to manipulate security settings in code
- The role played by workflows in managing security
- How to create a custom workflow and install it, using GenericSetup
- How security is invoked during URL traversal and in Restricted Python
In the next chapter, we will learn how to find and install third-party add-on components.