O'Reilly logo

The Definitive Guide to Plone, Second Edition by Andy McKay, Fabrizio Reale, Alice Narduzzo, Davide Moro, Maurizio Delmonte

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7Managing Security and Workflows

Zope has a very powerful and granular security architecture, and Plone of course inherits this structure. This chapter shows how security settings are handled in the Zope application server. Most of the concepts in this chapter are related to Zope users and permissions management, but as you saw in Chapter 4's "Managing Users and Permissions" section, you can also manage users, groups, and permissions through the Plone interface. If you have to work with simple settings, you should always work at the Plone level and use its tools for user management, security, and permission settings instead of working in the ZMI.

This chapter also covers a topic related to security: workflows in Plone. Workflows let ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required