Chapter 5. Users and Privileges
In this chapter, we will explore the following concepts:
A high-level view of Documentum security
Users and authentication
User authorization including privileges and client capabilities
User management
Documentum Security
At a high level, the security model in Documentum is similar to that used in contemporary enterprise applications. There are resources (information, objects) that need to be secured, there are operations that can be performed on the resources, and there are users who wish to perform these operations. The security configuration defines what is allowed for various combinations of users, operations, and resources. At run time, a user attempts to perform an operation and the components of the Documentum architecture resolve rules for the specific user, operation, and resource combination to allow or disallow the attempted operation.
At a detailed level, security implementation is very specific to the Documentum architecture. This is the first chapter...