Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Alfresco 3 Cookbook

You're reading from   Alfresco 3 Cookbook Over 70 recipes for implementing the most important functionalities of Alfresco

Arrow left icon
Product type Paperback
Published in Jul 2011
Publisher Packt
ISBN-13 9781849511087
Length 380 pages
Edition 1st Edition
Languages
Concepts
Arrow right icon
Toc

Table of Contents (21) Chapters Close

Alfresco 3 Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
1. Getting Started 2. Creating and Organizing Contents FREE CHAPTER 3. Securing and Searching Contents 4. Rules—the Smart Spaces 5. Alfresco Administration Console 6. Customizing Alfresco Web Client 7. Alfresco Content Model 8. Alfresco JavaScript API 9. FreeMarker Templates 10. Web Scripts 11. Working with Workflows 12. Integrating with MS Outlook and MS Office 13. Configuring Alfresco E-Mail and File Servers 14. Building Alfresco Index

Introduction


Once you have uploaded your content to a CMS system, the next major challenge is to secure your content from unauthorized usage. Taking the role of the content manager in an organization becomes a thing of paramount importance as there are confidential documents which not everybody should see and access.

Security, in a broader context, can be divided into two parts—Authentication and Authorization.

Authentication means how the user's identity is validated; how to determine whether the person trying to access the system is a valid and registered user or not. You normally do this every time and everywhere by putting your username and password. In Alfresco, however, you can perform authentication in several ways such as, standard Alfresco login, LDAP integration, and so on.

Authorization comes into picture after the user is authenticated, that means the system has recognized that the person is a valid user. Now the system needs to know what this particular user can do and what he...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image