SlideShare a Scribd company logo
#4




Alfresco
Implementing Membership and Security
                             Doc. v0.1 - 21/05/09




              Wildan Maulana | wildan [at] tobethink.com
Overview
In this presentation you will learn about the concepts and the
underlying framework behind Alfresco's security model and
membership system. The Alfresco security model is flexible
and allows you to choose either built-in security or an
external security model defined by your organization via
systems such as LDAP and Active Directory. You will
understand various security models and learn to choose the
one most suited to your enterprise's requirements. Alfresco's
membership system is highly scalable and can cater for
hundreds and thousands of users and content managers.
You Will Learn...
• Create, update and delete users
• Group users based on the activities they perform
• Search for and locate users and group
• Extend the security policy
• Secure spaces and individual content as per
  your organizational security requirements
• Choose a suitable security model
• Migrate existing users and group to Alfresco
Alfresco Membership and
          Security Model
•   Users and Group
•   Permissions and Roles
•   Authentication
•   How is Security Imposed in
    Alfresco ?
Users and Group
• Users are individual members, whereas groups are logical
  categorizations of users.
Permissions and Roles
• Permissions define access rights on spaces and content.
  Out of the box, Alfresco supports extensive permission
  settings on spaces and content.
• A permission group is a convenient grouping of
  permissions such as Read made up of ReadProperties and
  ReadChildren. Each one of these permissions is applicable
  to node, space, space properties, sub-space, content,
  content properties, and business rules. The following are
  typical permissions groups:
      – Read
      – Edit
      – Add
      – Delete
Permissions and Roles - 2
• Roles are collections of permissions assigned to a user.
  Each role comprises of a set of permissions. Alfresco
  provides out-of-the-box support for the following roles:
      – Consumer can read content
      – Editor can read and edit content
      – Contributor can read and add content
      – Collaborator can read, edit, and add content
      – Coordinator can read, edit, add, and delete
        content (full access)
• Alfresco roles and permissions may be extended to
  support your requirements.
Authentication
• Alfresco imposes authentication using the user name
  and password pair.
• Authentication is performed at the following entry
  points to the Alfresco repository:
      – Web client
      – CIFS
      – FTP
      – WebDAV
      – Web Services
      – Spring beans exposed as public services in Java
How is Security Imposed in Alfresco ?
Example

     Space Title               Group          Assigned Role
Finance Department   Finance           Coordinator — Full Access
                     Sales             Consumer — Only Read
                                       Access
                     Executive         Consumer — Only Read
                                       Access
Company Policies     HR                Coordinator — Full Access
                     EVERYONE          Consumer — Only Read
                                       Access
Manage System Users
    • Create a Space for All Users
    • Create New Users
    • Search for Existing Users
    • Modify User Details
    • Deleting a User

In Alfresco, each user can have his or her individual space. The location and name
for a space can be specified while creating a user account. The user for which a space
is created becomes the owner of that space. As an owner, the user can have full
access to his or her space.
Create Space for All Users
•   To create a new space for users, follow the steps below:
         – Click on the Company Home menu link in the tool bar (top left).
         – In the header click on Create | Create Space.
         – The create space dialog is displayed as shown in the following
           screenshot.
         –   In the Name text box, type Users Home.
         – In the Description text box, type Contains spaces for all
           users.
         – Click on the Create Space button to create the space.
Create New User
• Before adding users, you will need to know the
  following details for each user:
       – First Name
       – Last Name
       – Email ID (valid corporation email address)
       – Company ID (for customer extranet, this could
         be customer's company name)
       – User name (log-in ID)
       – Password
       – Home space name (usually user name)
To Create New User
1. In any space, click on the administration console button provided in the
   top tool bar
2. The administration console pane appears. Click on the Manage System
   Users link.
3. In the header, click the Create User link
New User Wizard #1
New User Wizard #2
New User Wizard #3




       Klik FINISH buttom to confirm
Search for Existing Users
Individual User Access
    • New User Log in and My Home Page
    • Update Personal Details and
      Password

Once a user account is created by the administrator, the user can log in to the system.
The administrator can set up an automated script to send an email to the user with
user id and password information.
New User Log in
and My Home Page
Update Personal Details and Password
Manage User Groups
• Create Groups and Sub-Groups
• Add Users to a Group
• Remove Users from a Group
Create Groups and Sub-Groups
•   Follow the steps given below to create a group:
         1. In any space, click on the administration console icon. The
            Administration Console pane appears.
         2. Click the Manage User Groups link. The Groups Management
            pane appears.
         3. In the header, click Create | Create Group. The Create Group
            Wizard appears as shown in the screenshot below. Specify
            Executive as Group Identifier, which is the group used for all
            company executives. Click on the Create Group button to
            confirm.
Create Groups and Sub-Groups #2
•   Create additional group :
         – Finance
         – Sales
         – HR
         – Marketing
         – Executive
         – HR
         – Engineering
         – QA
         – Documentation
Add Users to a Group
To add users to a group, click on the add users icon as shown in the following
screenshot. The Add User dialog will pop up. You can search for the system users
and add them to a group as shown in the next screenshot. Click on the OK button
to confirm the operation.
Add Users to a Group #2
Remove Users from a Group

• Users can be removed from a group by clicking on
  the remove user icon as shown in
  the screenshot on the next page.
Extend Security Permission
        and Roles
• Default Permissions
• Default Roles
• Create a Custom Role
Default Permissions
•   Alfresco supports a number of permissions to access the spaces, content,
    properties, etc. The following are some of the permissions for spaces:
         –   ReadProperties — Read space properties
         –   ReadChildren — Read the content within a space
         –   WriteProperties — Update properties such as title their description
         –   DeleteNode — Delete space
         –   DeleteChildren — Delete content and sub-spaces within a space
         –   CreateChildren — Create content within a space
•   The following are some of the permissions for content items:
         –   ReadContent — Read file
         –   WriteContent — Update file
         –   ReadProperties — Read file propertie
         –   WriteProperties — Update file properties such as title, description, etc.
         –   DeleteNode — Delete file
         –   ExecuteContent — Execute file
         –   SetOwner — Set ownership on a content item


       A complete list of default permissions and roles is provided in the Alfresco
       configuration file <config>modelpermissionDefinitions.xml.
Default Roles
•   Roles are collections of permissions assigned to users in a
    specific space. Sub-spaces may inherit permissions from their
    parent space. Roles may also be applied to individual content
    items. The following table lists the default roles supported out of
    the box by Alfresco:




               Role                              Permission
Consumer                          Read spaces and content
Editor                            Consumer + edit existing content
Contributor                       Consumer + add new content
Collaborator                      Editor + Contributor
Coordinator                       Full Control
Global Permissions
Excerpt from <config>modelpermissionDefinitions.xml

 <!--                                                   -->
 <!-- Global permissions apply regardless of any particular node context.     -->
 <!-- They can not be denied by the permissions set on any node.            -->
 <!--                                                   -->

 <!-- Admin can do anything to any ndoe                          -->
 <globalPermission permission=quot;FullControlquot; authority=quot;ROLE_ADMINISTRATORquot;/>

 <!-- For now, owners can always see, find and manipulate their stuff       -->
 <globalPermission permission=quot;FullControlquot; authority=quot;ROLE_OWNERquot;/>

 <!-- Unlock is granted to the lock owner                    -->
 <globalPermission permission=quot;Unlockquot; authority=quot;ROLE_LOCK_OWNERquot;/>

 <!-- Check in is granted to the lock owner                   -->
 <globalPermission permission=quot;CheckInquot; authority=quot;ROLE_LOCK_OWNERquot;/>

 <!-- Cancel check out is granted to the locak owner              -->
 <globalPermission permission=quot;CancelCheckOutquot; authority=quot;ROLE_LOCK_OWNERquot;/>
Create a Custom Role
You can add a new custom role as per your security requirements. You will have
to include details of the custom role in permissionDefinitions.xml, which is the
permission definitions file located at <config>model

      <permissionGroup name=quot;TestRolequot; allowFullControl=quot;falsequot;
                                      expose=quot;truequot; >
       <includePermissionGroup permissionGroup=quot;Readquot; type=quot;sys:basequot; />
       <includePermissionGroup permissionGroup=quot;AddChildrenquot;
                                    type=quot;sys:basequot;/>
       <includePermissionGroup type=quot;cm:lockablequot;
                             permissionGroup=quot;CheckOutquot;/>
      </permissionGroup>
Secure Your Spaces
• User Roles on a Space
• Invite Users to Your Space
• Define and Secure Your Spaces
User Roles on a Space
   Permission         Consume Contributor Editor   Collaborato   Coordinator
                         r                              r
Read Content             X         X      X            X             X
within space
Read Space               X         X      X            X             X
Properties
Read Sub-spaces          X         X      X            X             X
Read Forums,             X         X      X            X             X
Topics, Posts
Copy                     X         X      X            X             X
Preview in Template      X         X      X            X             X
Create Content                     X                   X             X
within space
Create Sub-Spaces                  X                   X             X
Create Forums,                     X                   X             X
Topics, Posts
Permission        Consume Contributor Editor   Collaborato   Coordinator
                        r                              r
Reply to Posts                    X                   X             X
Start Discussion                  X                   X             X
Edit Space's                             X            X             X
Properties
Add/Edit Space                           X            X             X
users
Delete Space users                                                  X
Add/Edit Space                           X            X             X
rules
Delete Space rules                                                  X
Cut Content/ Sub-                                                   X
Spaces
Delete                                                              X
Content/Sub-
Spaces
Check-out Content                        X        X             X
Update Content                           X        X             X
Take Ownership                                                  X
Invite Users to Your Space
• You can grant permission the users (or groups) to do
  specific tasks in your space.
  You do this by inviting users to join your space. Each role
  applies only to the space in
  which it is assigned. For example, you could invite a user
  (or group) to one of your
  spaces as an editor. You could invite the same user (or
  group) to a different space as
  a collaborator. That same user (or group) could be invited
  to someone else's space as
  a coordinator.
Invite Users to Your Space #2
1. Click on the Company Home menu link in the tool bar (top left).
2. In the header click the Create | Create Space link.
3. Create a new space called Intranet.
4. Within the Intranet space create a sub-space called Finance
   Department. Ensure that you are in the Finance Department
   space.
5. In the space header, click More Actions | Manage Space
   Users. The Manage Space Users pane appears as shown in
   the following screenshot:
Invite Users to Your Space #3
6. Leave the Inherit Parent Space Permissions option as
   checked (selected). When it is not selected, uninvited users
   cannot see the content item. Only invited users can see the
   content item, and can access it according to their assigned role.
7. In the header, click the Invite link. The Invite User Wizard
   pane appears as shown in the following screenshot:
Invite Users to Your Space #4
8. Before continuing with your invitation, you can experiment with
   the Search feature. Select the Groups from the drop-down box
   and click on the Search button.
9. From the search results, select the Finance group, give it the
   Coordinator role and click on the Add to list button.
10.The finance group is added to the list of invitees.
11.As an administrator of the Finance Department space, you can
   invite the Finance group as coordinator (full access) and the
   Sales and Executive groups as consumer (read access).
12.Click on the Next button to go to the second pane, where you
   can notify the selected users.
Invite Users to Your Space #5
13.Do not select this option as you do not have to notify these
   selected users in this sample. Click on the Finish button to
   confirm.


  Notice the permissions given to the groups on this space as
  shown in the screenshot below:
Define and Secure Your Spaces

• In the example above, you created a space called
  Finance Department and you gave the Coordinator
  role (full control) to the Finance group and gave the
  Consumer role (read access) to the Sales and
  Executive groups.


• Next, go to your Company Home | Intranet space
  and create spaces as given in the first column of the
  table overleaf. Invite groups and assign roles as
  indicated in the second column of the table on the
  next slide :
Define and Secure Your Spaces
    Space Name           Group (Assigned Role)        Individual (Assigned Role)
Executive and Board      Executive (Coordinator)
Company Policies         ● HR (Coordinator)
                         ● EVERYONE (Consumer)


Press and Media          ● Corporate
                         Communications
                         (Coordinator)
                         ● EVERYONE (Consumer)


Marketing                ● Marketing (Coordinator)
Communications           ● EVERYONE (Consumer)


Sales Department         ● Sales (Coordinator)       Mr. CEO (Coordinator)
                         ● Executive (Consumer)


Finance Department       ● Finance (Coordinator)
                         ● Sales (Consumer)

                         ● Executive (Consumer)


Engineering Department   ● Engineering         Mrs. Presales (Coordinator)
                         (Coordinator)
                         ● EVERYONE (Consumer)
Secure Your Content
• User Roles for Content
• Invite Users to Your Content
User Roles for Content
      •   Alfresco uses roles to determine what a user can and cannot do with the
          content. These roles are associated with permissions. The table below
          shows each role and the permissions for that role for content:
          PermissionsX            Consumer   Contributor   Editor   Collaborator   Coordinator

Read Content                         X           X           X           X             X
Read Content Properties              X           X           X           X             X
Copy                                 X           X           X           X
Preview in Template                  X           X           X           X             X
Start Discussion                                 X                       X             X
Edit Content                                                 X           X             X
Edit Properties                                              X           X             X
Apply Versioning                                             X           X             X
Apply Categorization                                         X           X             X
Check-out                                                    X           X             X
Update                                                       X           X             X
Take ownership                                                                         X
Cut                                                                                    X
Delete                                                                                 X
Invite Users to Your Content
•   Typically security and access control rules are defined at the
    space level. It is not advised to secure individual content items
    as it may become unmanageable with large numbers of files. It is
    the best practice to secure the parent space rather than securing
    the content itself. However, you can still control the access to a
    specific content item.
•   Follow the steps below to invite users to your content item:
        1. Go to a space and add a file by clicking on the Add
           Content link.
        2. Click on the View Details icon for the file to see the
           detailed view of the content.
        3. From the right-hand side Actions menu, click on the
           Manage Content Users link, to assign users to this
           content item for collaboration.
        4. Search and select a user and assign a Collaborator role
           to the user.
Choosing the Right Security
        Model for You
   • Use Alfresco Out-of-the-Box
     Membership System
   • Configuring LDAP for Centralized
     Identity Management
   • Configuring NTLM for Single Sign-on
It is very important to choose a suitable security model at
the beginning of Alfresco implementation. The authentication
mechanism, user profile data storage, security settings,
business rules, etc. are all based on the security model you choose.
The Scenario
Scenario 1: I would like to build an extranet as a stand-alone application to share
documents with my customers. I have over 500 customers who will access the site,
and I would like to control and manage the security. I need a flexible and highly
scalable membership system.

                          In this scenario, the out-of-the-box Alfresco membership
                          system would be able to solve the problem.

I work in the IT department of a large university. Over the years, the
various departments have developed their own sites with local authentication and
authorization. Our university has a directory-based central authentication system.
How can I consolidate all the sites and provide a central point of authentication and
authorization for all our sub-sites?


                          In this scenario, it would make sense configure Alfresco
                          with LDAP for centralized identity management.
Use Alfresco Out-of-the-Box Membership
                  System

• Alfresco out of the box security includes the following
  functionality:
      – User management
      – Provision of user personal information
      – User authentication
      – Group management
      – Ownership of nodes within repository
      – An extendable permission model
      – Access control, to restrict call to public services
        authenticated users
Configuring LDAP for Centralized Identity
               Management

• There are three parts to Alfresco LDAP configuration
      – Authentication
      – Scheduled jobs for loading people and groups
      – The authentication context (which configures LDAP
        authentication and how people and groups are
        extracted from LDAP).




                           A template configuration is provided in
                           alfresco/extensions/ldap‐authentication-
                           context.xml.sample.
Configuring NTLM for Single Sign-on


  A template configuration is provided in
  alfresco/extensions/ntlm‐authentication-context.xml.sample.



To enable NTLM authentication you need to edit
the web.xml file (the location of the file depends on
the application server used) and uncomment <filter> elements
for NTLM.


                To enable NTLM pass-through you need to replace the file
                <config>/authentication-services-context.xml with the <config>/
                authentication-services-context.ntlm file.
Migrate Existing Users to
         Alfresco
• Using Command-Line Scripts to Bulk
  Upload Users
• Bootstrapping the Alfresco
  Repository with Pre-Defined User
  Data
• Using Web Services API to Create
  Users
Using Command-Line Scripts
                    to Bulk Upload Users
                      person.xml
•   Create xml file   <?xml version=quot;1.0quot; encoding=quot;UTF-8quot;?>
                       <view:view xmlns:d=quot;http://www.alfresco.org/model/dictionary/1.0quot;
                                xmlns:cm=quot;http://www.alfresco.org/model/content/1.0quot;
                             xmlns:view=quot;http://www.alfresco.org/view/repository/1.0quot;>
                        <cm:person view:childName=quot;cm:personquot;>
                         <cm:userName>fredb</cm:userName>
                         <cm:firstName>Fred</cm:firstName>
                         <cm:lastName>Bloggs</cm:lastName>

                         <cm:email>fredb@alfresco.org</cm:email>
                        </cm:person>

                        <cm:person view:childName=quot;cm:personquot;>
                         <cm:userName>sues</cm:userName>
                         <cm:firstName>Sue</cm:firstName>
                         <cm:lastName>Sanderson</cm:lastName>

                         <cm:email>sues@alfresco.org</cm:email>
                        </cm:person>

                       </view:view>
Using Command-Line Scripts
              to Bulk Upload Users

java -classpath classes;
librepository.jar;libcore.jar;libspring.jar;
libjibx-run.jar;libxpp3.jar;libcommons-logging.jar;
libehcache-1.1.jar;libdom4j-1.6.1.jar;libacegi-security-0.8.2.jar;
libhibernate3.jar;libquartz.jar;libpdfbox-0.7.2.jar;
libpoi-2.5.1.jar;libjooconverter.jar;libjid3lib-0.5.jar;
libfreemarker.jar;liblog4j-1.2.8.jar;libcryptix-jce-provider.jar;
libcommons-codec-1.2.jar;lib
          commons-dbcp-1.2.1.jar;libcommons‐pool.jar;libjta.jar;
libmail.jar;libactivation.jar;libjug.jar;lib
                             commons-collections-3.0.jar;
libcglib-nodep-2.1.jar;libantlr-2.7.5H3.jar;
libtm-extractors-0.4_patched.jar;libridl.jar;
libjuh.jar;libjurt.jar;libsandbox.jar;libjut.jar;
liblucene-1.4.3.jar;......commonlib
                           mysql-connector-java-3.1.12-bin.jar;
libsaxpath.jar;libjaxen-1.1-beta-8.jar org.alfresco.tools.
   Import -user admin -pwd admin -store workspace://SpacesStore -path
                              sys:systemsys:people person.xml
Bootstrapping the Alfresco Repository with
         Pre-Defined User Data
• The Alfresco repository supports a bootstrap process,
  which is initiated whenever the repository is first started.
  The process populates the repository with information that
  is required upon first log in, such as system users, data
  dictionary definitions, and important root folders.
Using the Web Services API to Create Users


• You may also use the web services API to
  programmatically create users in Alfresco. This is useful if
  you already have another software application to manage
  users and you would like to create users in Alfresco from
  that application as needed.
Summary
• The Alfresco membership framework is very secure,
  flexible, scalable, and customizable. Roles are collections
  of permissions assigned to users (Consumer, Contributor,
  Editor, Collaborator, and Coordinator). You can manage
  system users and groups through the administration
  console. Security is imposed by assigning a role to a
  specific user or group for a specific space or content.
  Authentication is possible using Alfresco's built-in
  membership system, NTLM, and LDAP. You can bulk
  upload users to Alfresco using command-line utilities and
  the web services API.
Reference
• Alfresco, Enterprise Content Management
     Implementation, Munwar Sharif, PACKT Publishing

More Related Content

What's hot

Dart ppt
Dart pptDart ppt
Dart ppt
Krishna Teja
 
Introduction to html course digital markerters
Introduction to html course digital markertersIntroduction to html course digital markerters
Introduction to html course digital markerters
SEO SKills
 
Html5 semantics
Html5 semanticsHtml5 semantics
Html5 semantics
Webtech Learning
 
Html images syntax
Html images syntaxHtml images syntax
Html images syntax
JayjZens
 
HTML Semantic Tags
HTML Semantic TagsHTML Semantic Tags
HTML Semantic Tags
Bruce Kyle
 
Alfresco CMIS
Alfresco CMISAlfresco CMIS
Alfresco CMIS
Alfresco Software
 
Searching in AtoM
Searching in AtoMSearching in AtoM
Searching in AtoM
Artefactual Systems - AtoM
 
Html n CSS
Html n CSSHtml n CSS
Html n CSS
Sukrit Gupta
 
Web html table tags
Web html  table tagsWeb html  table tags
Web html table tags
Kainat Ilyas
 
Upgrading to Alfresco 6
Upgrading to Alfresco 6Upgrading to Alfresco 6
Upgrading to Alfresco 6
Angel Borroy López
 
Introduction to css & its attributes with syntax
Introduction to css & its attributes with syntaxIntroduction to css & its attributes with syntax
Introduction to css & its attributes with syntax
priyadharshini murugan
 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to htmlvikasgaur31
 
Lwc presentation
Lwc presentationLwc presentation
Lwc presentation
Nithesh N
 
HTML Tables
HTML TablesHTML Tables
HTML Tables
Nisa Soomro
 
HTML Semantic Elements
HTML Semantic ElementsHTML Semantic Elements
HTML Semantic Elements
Reema
 
Scale your Alfresco Solutions
Scale your Alfresco Solutions Scale your Alfresco Solutions
Scale your Alfresco Solutions
Alfresco Software
 
HTML Frameset & Inline Frame
HTML Frameset & Inline FrameHTML Frameset & Inline Frame
HTML Frameset & Inline Frame
Nisa Soomro
 
HTML5: features with examples
HTML5: features with examplesHTML5: features with examples
HTML5: features with examples
Alfredo Torre
 

What's hot (20)

Html frames
Html framesHtml frames
Html frames
 
Dart ppt
Dart pptDart ppt
Dart ppt
 
Introduction to html course digital markerters
Introduction to html course digital markertersIntroduction to html course digital markerters
Introduction to html course digital markerters
 
Html5 semantics
Html5 semanticsHtml5 semantics
Html5 semantics
 
Html images syntax
Html images syntaxHtml images syntax
Html images syntax
 
HTML Semantic Tags
HTML Semantic TagsHTML Semantic Tags
HTML Semantic Tags
 
Alfresco CMIS
Alfresco CMISAlfresco CMIS
Alfresco CMIS
 
Searching in AtoM
Searching in AtoMSearching in AtoM
Searching in AtoM
 
Html n CSS
Html n CSSHtml n CSS
Html n CSS
 
Web html table tags
Web html  table tagsWeb html  table tags
Web html table tags
 
Introduction to HTML and CSS
Introduction to HTML and CSSIntroduction to HTML and CSS
Introduction to HTML and CSS
 
Upgrading to Alfresco 6
Upgrading to Alfresco 6Upgrading to Alfresco 6
Upgrading to Alfresco 6
 
Introduction to css & its attributes with syntax
Introduction to css & its attributes with syntaxIntroduction to css & its attributes with syntax
Introduction to css & its attributes with syntax
 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to html
 
Lwc presentation
Lwc presentationLwc presentation
Lwc presentation
 
HTML Tables
HTML TablesHTML Tables
HTML Tables
 
HTML Semantic Elements
HTML Semantic ElementsHTML Semantic Elements
HTML Semantic Elements
 
Scale your Alfresco Solutions
Scale your Alfresco Solutions Scale your Alfresco Solutions
Scale your Alfresco Solutions
 
HTML Frameset & Inline Frame
HTML Frameset & Inline FrameHTML Frameset & Inline Frame
HTML Frameset & Inline Frame
 
HTML5: features with examples
HTML5: features with examplesHTML5: features with examples
HTML5: features with examples
 

Similar to Alfresco : Implementing Membership and Security

24 - Panorama Necto 14 administration - visualization & data discovery solution
24  - Panorama Necto 14 administration - visualization & data discovery solution24  - Panorama Necto 14 administration - visualization & data discovery solution
24 - Panorama Necto 14 administration - visualization & data discovery solution
Panorama Software
 
SOP_ERP_AdministrationModule
SOP_ERP_AdministrationModuleSOP_ERP_AdministrationModule
SOP_ERP_AdministrationModuleSunil Mukadam
 
Hp storage
Hp storage Hp storage
Hp storage
Quemby
 
Security and-data-access-document
Security and-data-access-documentSecurity and-data-access-document
Security and-data-access-documentAmit Sharma
 
Essbase security implementation
Essbase security implementationEssbase security implementation
Essbase security implementation
Amit Sharma
 
Essbase security implementation
Essbase security implementationEssbase security implementation
Essbase security implementationAmit Sharma
 
Cairo meetup low code best practices
Cairo meetup low code best practicesCairo meetup low code best practices
Cairo meetup low code best practices
Ahmed Keshk
 
Users and groups in xp
Users and groups in xpUsers and groups in xp
Users and groups in xpRauf Wani
 
6 Elements_Permissions.pdf
6 Elements_Permissions.pdf6 Elements_Permissions.pdf
6 Elements_Permissions.pdf
Jeff Smith
 
Elements_Users_and_Groups.pdf
Elements_Users_and_Groups.pdfElements_Users_and_Groups.pdf
Elements_Users_and_Groups.pdf
Jeff Smith
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administrator
Aisha Talat
 
359555069 aae-control room-usermanual
359555069 aae-control room-usermanual359555069 aae-control room-usermanual
359555069 aae-control room-usermanual
BishnujitBanerjee
 
Lesson 3 - Insite Creative Workflow Roles And Responsibilities
Lesson 3 - Insite Creative Workflow   Roles And ResponsibilitiesLesson 3 - Insite Creative Workflow   Roles And Responsibilities
Lesson 3 - Insite Creative Workflow Roles And Responsibilities
Informatica
 
Essbase security-implementation
Essbase security-implementationEssbase security-implementation
Essbase security-implementation
Amit Sharma
 
10 necto administration_ready
10 necto administration_ready10 necto administration_ready
10 necto administration_readywww.panorama.com
 
Elements_Permissions.pdf
Elements_Permissions.pdfElements_Permissions.pdf
Elements_Permissions.pdf
Jeff Smith
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
Mahmmoud Mahdi
 
Necto 16 training 17 - administration
Necto 16 training 17 -  administrationNecto 16 training 17 -  administration
Necto 16 training 17 - administration
Panorama Software
 
Elements_Share_for_Administrators.pdf
Elements_Share_for_Administrators.pdfElements_Share_for_Administrators.pdf
Elements_Share_for_Administrators.pdf
Jeff Smith
 
Security
SecuritySecurity

Similar to Alfresco : Implementing Membership and Security (20)

24 - Panorama Necto 14 administration - visualization & data discovery solution
24  - Panorama Necto 14 administration - visualization & data discovery solution24  - Panorama Necto 14 administration - visualization & data discovery solution
24 - Panorama Necto 14 administration - visualization & data discovery solution
 
SOP_ERP_AdministrationModule
SOP_ERP_AdministrationModuleSOP_ERP_AdministrationModule
SOP_ERP_AdministrationModule
 
Hp storage
Hp storage Hp storage
Hp storage
 
Security and-data-access-document
Security and-data-access-documentSecurity and-data-access-document
Security and-data-access-document
 
Essbase security implementation
Essbase security implementationEssbase security implementation
Essbase security implementation
 
Essbase security implementation
Essbase security implementationEssbase security implementation
Essbase security implementation
 
Cairo meetup low code best practices
Cairo meetup low code best practicesCairo meetup low code best practices
Cairo meetup low code best practices
 
Users and groups in xp
Users and groups in xpUsers and groups in xp
Users and groups in xp
 
6 Elements_Permissions.pdf
6 Elements_Permissions.pdf6 Elements_Permissions.pdf
6 Elements_Permissions.pdf
 
Elements_Users_and_Groups.pdf
Elements_Users_and_Groups.pdfElements_Users_and_Groups.pdf
Elements_Users_and_Groups.pdf
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administrator
 
359555069 aae-control room-usermanual
359555069 aae-control room-usermanual359555069 aae-control room-usermanual
359555069 aae-control room-usermanual
 
Lesson 3 - Insite Creative Workflow Roles And Responsibilities
Lesson 3 - Insite Creative Workflow   Roles And ResponsibilitiesLesson 3 - Insite Creative Workflow   Roles And Responsibilities
Lesson 3 - Insite Creative Workflow Roles And Responsibilities
 
Essbase security-implementation
Essbase security-implementationEssbase security-implementation
Essbase security-implementation
 
10 necto administration_ready
10 necto administration_ready10 necto administration_ready
10 necto administration_ready
 
Elements_Permissions.pdf
Elements_Permissions.pdfElements_Permissions.pdf
Elements_Permissions.pdf
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
 
Necto 16 training 17 - administration
Necto 16 training 17 -  administrationNecto 16 training 17 -  administration
Necto 16 training 17 - administration
 
Elements_Share_for_Administrators.pdf
Elements_Share_for_Administrators.pdfElements_Share_for_Administrators.pdf
Elements_Share_for_Administrators.pdf
 
Security
SecuritySecurity
Security
 

More from Wildan Maulana

Hasil Pendataan Potensi Desa 2018
Hasil Pendataan Potensi Desa 2018Hasil Pendataan Potensi Desa 2018
Hasil Pendataan Potensi Desa 2018
Wildan Maulana
 
Double for Nothing? Experimental Evidence on an Unconditional TeacherSalary I...
Double for Nothing? Experimental Evidence on an Unconditional TeacherSalary I...Double for Nothing? Experimental Evidence on an Unconditional TeacherSalary I...
Double for Nothing? Experimental Evidence on an Unconditional TeacherSalary I...
Wildan Maulana
 
Ketahanan Pangan #1 : Gerakan Sekolah Menanam Melon
Ketahanan Pangan #1 : Gerakan Sekolah Menanam MelonKetahanan Pangan #1 : Gerakan Sekolah Menanam Melon
Ketahanan Pangan #1 : Gerakan Sekolah Menanam Melon
Wildan Maulana
 
Pengembangan OpenThink SAS 2013-2014
Pengembangan OpenThink SAS 2013-2014Pengembangan OpenThink SAS 2013-2014
Pengembangan OpenThink SAS 2013-2014Wildan Maulana
 
ICA – AtoM : Retensi Arsip
ICA – AtoM : Retensi ArsipICA – AtoM : Retensi Arsip
ICA – AtoM : Retensi ArsipWildan Maulana
 
OpenThink Labs Workshop : Ketahanan Pangan Skala RT/RW
OpenThink Labs Workshop : Ketahanan Pangan Skala RT/RWOpenThink Labs Workshop : Ketahanan Pangan Skala RT/RW
OpenThink Labs Workshop : Ketahanan Pangan Skala RT/RWWildan Maulana
 
OpenThink Labs : Dengar Pendapat Komunitas ciliwung dengan kemen pu dan kemen...
OpenThink Labs : Dengar Pendapat Komunitas ciliwung dengan kemen pu dan kemen...OpenThink Labs : Dengar Pendapat Komunitas ciliwung dengan kemen pu dan kemen...
OpenThink Labs : Dengar Pendapat Komunitas ciliwung dengan kemen pu dan kemen...Wildan Maulana
 
PostgreSQL BootCamp : Manajemen Master Data dengan SkyTools
PostgreSQL BootCamp : Manajemen Master Data dengan SkyToolsPostgreSQL BootCamp : Manajemen Master Data dengan SkyTools
PostgreSQL BootCamp : Manajemen Master Data dengan SkyToolsWildan Maulana
 
Mensetup Google Apps sebagai IdP jenis openID dan Aplikasi Berbasis CakePHP ...
Mensetup Google Apps sebagai IdP jenis openID  dan Aplikasi Berbasis CakePHP ...Mensetup Google Apps sebagai IdP jenis openID  dan Aplikasi Berbasis CakePHP ...
Mensetup Google Apps sebagai IdP jenis openID dan Aplikasi Berbasis CakePHP ...Wildan Maulana
 
Mensetup Google Apps sebagai IdP jenis openID dan Wordpress sebagai Sp
Mensetup Google Apps sebagai IdP jenis openID dan Wordpress sebagai SpMensetup Google Apps sebagai IdP jenis openID dan Wordpress sebagai Sp
Mensetup Google Apps sebagai IdP jenis openID dan Wordpress sebagai SpWildan Maulana
 
Konfigurasi simpleSAMLphp dengan Google Apps Sebagai Identity Provider
Konfigurasi simpleSAMLphp  dengan Google Apps Sebagai Identity ProviderKonfigurasi simpleSAMLphp  dengan Google Apps Sebagai Identity Provider
Konfigurasi simpleSAMLphp dengan Google Apps Sebagai Identity ProviderWildan Maulana
 
Instalasi simpleSAMLphp sebagai Identity Provider (IdP)
Instalasi simpleSAMLphp sebagai Identity Provider (IdP)Instalasi simpleSAMLphp sebagai Identity Provider (IdP)
Instalasi simpleSAMLphp sebagai Identity Provider (IdP)Wildan Maulana
 
Instalasi dan Konfigurasi simpleSAMLphp
Instalasi dan Konfigurasi simpleSAMLphpInstalasi dan Konfigurasi simpleSAMLphp
Instalasi dan Konfigurasi simpleSAMLphpWildan Maulana
 
River Restoration in Asia and Connection Between IWRM and River Restoration
River Restoration in Asia and Connection Between IWRM and River RestorationRiver Restoration in Asia and Connection Between IWRM and River Restoration
River Restoration in Asia and Connection Between IWRM and River RestorationWildan Maulana
 
Optimasi Limpasan Air Limbah Ke Kali Surabaya (Segmen Sepanjang – Jagir) De...
Optimasi Limpasan Air Limbah  Ke Kali Surabaya (Segmen Sepanjang – Jagir)  De...Optimasi Limpasan Air Limbah  Ke Kali Surabaya (Segmen Sepanjang – Jagir)  De...
Optimasi Limpasan Air Limbah Ke Kali Surabaya (Segmen Sepanjang – Jagir) De...
Wildan Maulana
 
Penilaian Siswa di Finlandia - Pendidikan Dasar
Penilaian Siswa di Finlandia - Pendidikan DasarPenilaian Siswa di Finlandia - Pendidikan Dasar
Penilaian Siswa di Finlandia - Pendidikan DasarWildan Maulana
 
Statistik Listrik
Statistik ListrikStatistik Listrik
Statistik Listrik
Wildan Maulana
 
Proyek Al-'Alaq : Electric Bicycles ; History, Characteristics, and Uses
Proyek Al-'Alaq : Electric Bicycles ; History, Characteristics, and UsesProyek Al-'Alaq : Electric Bicycles ; History, Characteristics, and Uses
Proyek Al-'Alaq : Electric Bicycles ; History, Characteristics, and UsesWildan Maulana
 
OpenThink SAS : Interaksi Antara Sekolah, Wali Kelas, Siswa dan Orang Tua
OpenThink SAS : Interaksi Antara Sekolah, Wali Kelas, Siswa dan Orang TuaOpenThink SAS : Interaksi Antara Sekolah, Wali Kelas, Siswa dan Orang Tua
OpenThink SAS : Interaksi Antara Sekolah, Wali Kelas, Siswa dan Orang TuaWildan Maulana
 
Menggunakan AlisJK : Equating
Menggunakan AlisJK : EquatingMenggunakan AlisJK : Equating
Menggunakan AlisJK : Equating
Wildan Maulana
 

More from Wildan Maulana (20)

Hasil Pendataan Potensi Desa 2018
Hasil Pendataan Potensi Desa 2018Hasil Pendataan Potensi Desa 2018
Hasil Pendataan Potensi Desa 2018
 
Double for Nothing? Experimental Evidence on an Unconditional TeacherSalary I...
Double for Nothing? Experimental Evidence on an Unconditional TeacherSalary I...Double for Nothing? Experimental Evidence on an Unconditional TeacherSalary I...
Double for Nothing? Experimental Evidence on an Unconditional TeacherSalary I...
 
Ketahanan Pangan #1 : Gerakan Sekolah Menanam Melon
Ketahanan Pangan #1 : Gerakan Sekolah Menanam MelonKetahanan Pangan #1 : Gerakan Sekolah Menanam Melon
Ketahanan Pangan #1 : Gerakan Sekolah Menanam Melon
 
Pengembangan OpenThink SAS 2013-2014
Pengembangan OpenThink SAS 2013-2014Pengembangan OpenThink SAS 2013-2014
Pengembangan OpenThink SAS 2013-2014
 
ICA – AtoM : Retensi Arsip
ICA – AtoM : Retensi ArsipICA – AtoM : Retensi Arsip
ICA – AtoM : Retensi Arsip
 
OpenThink Labs Workshop : Ketahanan Pangan Skala RT/RW
OpenThink Labs Workshop : Ketahanan Pangan Skala RT/RWOpenThink Labs Workshop : Ketahanan Pangan Skala RT/RW
OpenThink Labs Workshop : Ketahanan Pangan Skala RT/RW
 
OpenThink Labs : Dengar Pendapat Komunitas ciliwung dengan kemen pu dan kemen...
OpenThink Labs : Dengar Pendapat Komunitas ciliwung dengan kemen pu dan kemen...OpenThink Labs : Dengar Pendapat Komunitas ciliwung dengan kemen pu dan kemen...
OpenThink Labs : Dengar Pendapat Komunitas ciliwung dengan kemen pu dan kemen...
 
PostgreSQL BootCamp : Manajemen Master Data dengan SkyTools
PostgreSQL BootCamp : Manajemen Master Data dengan SkyToolsPostgreSQL BootCamp : Manajemen Master Data dengan SkyTools
PostgreSQL BootCamp : Manajemen Master Data dengan SkyTools
 
Mensetup Google Apps sebagai IdP jenis openID dan Aplikasi Berbasis CakePHP ...
Mensetup Google Apps sebagai IdP jenis openID  dan Aplikasi Berbasis CakePHP ...Mensetup Google Apps sebagai IdP jenis openID  dan Aplikasi Berbasis CakePHP ...
Mensetup Google Apps sebagai IdP jenis openID dan Aplikasi Berbasis CakePHP ...
 
Mensetup Google Apps sebagai IdP jenis openID dan Wordpress sebagai Sp
Mensetup Google Apps sebagai IdP jenis openID dan Wordpress sebagai SpMensetup Google Apps sebagai IdP jenis openID dan Wordpress sebagai Sp
Mensetup Google Apps sebagai IdP jenis openID dan Wordpress sebagai Sp
 
Konfigurasi simpleSAMLphp dengan Google Apps Sebagai Identity Provider
Konfigurasi simpleSAMLphp  dengan Google Apps Sebagai Identity ProviderKonfigurasi simpleSAMLphp  dengan Google Apps Sebagai Identity Provider
Konfigurasi simpleSAMLphp dengan Google Apps Sebagai Identity Provider
 
Instalasi simpleSAMLphp sebagai Identity Provider (IdP)
Instalasi simpleSAMLphp sebagai Identity Provider (IdP)Instalasi simpleSAMLphp sebagai Identity Provider (IdP)
Instalasi simpleSAMLphp sebagai Identity Provider (IdP)
 
Instalasi dan Konfigurasi simpleSAMLphp
Instalasi dan Konfigurasi simpleSAMLphpInstalasi dan Konfigurasi simpleSAMLphp
Instalasi dan Konfigurasi simpleSAMLphp
 
River Restoration in Asia and Connection Between IWRM and River Restoration
River Restoration in Asia and Connection Between IWRM and River RestorationRiver Restoration in Asia and Connection Between IWRM and River Restoration
River Restoration in Asia and Connection Between IWRM and River Restoration
 
Optimasi Limpasan Air Limbah Ke Kali Surabaya (Segmen Sepanjang – Jagir) De...
Optimasi Limpasan Air Limbah  Ke Kali Surabaya (Segmen Sepanjang – Jagir)  De...Optimasi Limpasan Air Limbah  Ke Kali Surabaya (Segmen Sepanjang – Jagir)  De...
Optimasi Limpasan Air Limbah Ke Kali Surabaya (Segmen Sepanjang – Jagir) De...
 
Penilaian Siswa di Finlandia - Pendidikan Dasar
Penilaian Siswa di Finlandia - Pendidikan DasarPenilaian Siswa di Finlandia - Pendidikan Dasar
Penilaian Siswa di Finlandia - Pendidikan Dasar
 
Statistik Listrik
Statistik ListrikStatistik Listrik
Statistik Listrik
 
Proyek Al-'Alaq : Electric Bicycles ; History, Characteristics, and Uses
Proyek Al-'Alaq : Electric Bicycles ; History, Characteristics, and UsesProyek Al-'Alaq : Electric Bicycles ; History, Characteristics, and Uses
Proyek Al-'Alaq : Electric Bicycles ; History, Characteristics, and Uses
 
OpenThink SAS : Interaksi Antara Sekolah, Wali Kelas, Siswa dan Orang Tua
OpenThink SAS : Interaksi Antara Sekolah, Wali Kelas, Siswa dan Orang TuaOpenThink SAS : Interaksi Antara Sekolah, Wali Kelas, Siswa dan Orang Tua
OpenThink SAS : Interaksi Antara Sekolah, Wali Kelas, Siswa dan Orang Tua
 
Menggunakan AlisJK : Equating
Menggunakan AlisJK : EquatingMenggunakan AlisJK : Equating
Menggunakan AlisJK : Equating
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Alfresco : Implementing Membership and Security

  • 1. #4 Alfresco Implementing Membership and Security Doc. v0.1 - 21/05/09 Wildan Maulana | wildan [at] tobethink.com
  • 2. Overview In this presentation you will learn about the concepts and the underlying framework behind Alfresco's security model and membership system. The Alfresco security model is flexible and allows you to choose either built-in security or an external security model defined by your organization via systems such as LDAP and Active Directory. You will understand various security models and learn to choose the one most suited to your enterprise's requirements. Alfresco's membership system is highly scalable and can cater for hundreds and thousands of users and content managers.
  • 3. You Will Learn... • Create, update and delete users • Group users based on the activities they perform • Search for and locate users and group • Extend the security policy • Secure spaces and individual content as per your organizational security requirements • Choose a suitable security model • Migrate existing users and group to Alfresco
  • 4. Alfresco Membership and Security Model • Users and Group • Permissions and Roles • Authentication • How is Security Imposed in Alfresco ?
  • 5. Users and Group • Users are individual members, whereas groups are logical categorizations of users.
  • 6. Permissions and Roles • Permissions define access rights on spaces and content. Out of the box, Alfresco supports extensive permission settings on spaces and content. • A permission group is a convenient grouping of permissions such as Read made up of ReadProperties and ReadChildren. Each one of these permissions is applicable to node, space, space properties, sub-space, content, content properties, and business rules. The following are typical permissions groups: – Read – Edit – Add – Delete
  • 7. Permissions and Roles - 2 • Roles are collections of permissions assigned to a user. Each role comprises of a set of permissions. Alfresco provides out-of-the-box support for the following roles: – Consumer can read content – Editor can read and edit content – Contributor can read and add content – Collaborator can read, edit, and add content – Coordinator can read, edit, add, and delete content (full access) • Alfresco roles and permissions may be extended to support your requirements.
  • 8. Authentication • Alfresco imposes authentication using the user name and password pair. • Authentication is performed at the following entry points to the Alfresco repository: – Web client – CIFS – FTP – WebDAV – Web Services – Spring beans exposed as public services in Java
  • 9. How is Security Imposed in Alfresco ?
  • 10. Example Space Title Group Assigned Role Finance Department Finance Coordinator — Full Access Sales Consumer — Only Read Access Executive Consumer — Only Read Access Company Policies HR Coordinator — Full Access EVERYONE Consumer — Only Read Access
  • 11. Manage System Users • Create a Space for All Users • Create New Users • Search for Existing Users • Modify User Details • Deleting a User In Alfresco, each user can have his or her individual space. The location and name for a space can be specified while creating a user account. The user for which a space is created becomes the owner of that space. As an owner, the user can have full access to his or her space.
  • 12. Create Space for All Users • To create a new space for users, follow the steps below: – Click on the Company Home menu link in the tool bar (top left). – In the header click on Create | Create Space. – The create space dialog is displayed as shown in the following screenshot. – In the Name text box, type Users Home. – In the Description text box, type Contains spaces for all users. – Click on the Create Space button to create the space.
  • 13. Create New User • Before adding users, you will need to know the following details for each user: – First Name – Last Name – Email ID (valid corporation email address) – Company ID (for customer extranet, this could be customer's company name) – User name (log-in ID) – Password – Home space name (usually user name)
  • 14. To Create New User 1. In any space, click on the administration console button provided in the top tool bar 2. The administration console pane appears. Click on the Manage System Users link. 3. In the header, click the Create User link
  • 17. New User Wizard #3 Klik FINISH buttom to confirm
  • 19. Individual User Access • New User Log in and My Home Page • Update Personal Details and Password Once a user account is created by the administrator, the user can log in to the system. The administrator can set up an automated script to send an email to the user with user id and password information.
  • 20. New User Log in and My Home Page
  • 21. Update Personal Details and Password
  • 22. Manage User Groups • Create Groups and Sub-Groups • Add Users to a Group • Remove Users from a Group
  • 23. Create Groups and Sub-Groups • Follow the steps given below to create a group: 1. In any space, click on the administration console icon. The Administration Console pane appears. 2. Click the Manage User Groups link. The Groups Management pane appears. 3. In the header, click Create | Create Group. The Create Group Wizard appears as shown in the screenshot below. Specify Executive as Group Identifier, which is the group used for all company executives. Click on the Create Group button to confirm.
  • 24. Create Groups and Sub-Groups #2 • Create additional group : – Finance – Sales – HR – Marketing – Executive – HR – Engineering – QA – Documentation
  • 25. Add Users to a Group To add users to a group, click on the add users icon as shown in the following screenshot. The Add User dialog will pop up. You can search for the system users and add them to a group as shown in the next screenshot. Click on the OK button to confirm the operation.
  • 26. Add Users to a Group #2
  • 27. Remove Users from a Group • Users can be removed from a group by clicking on the remove user icon as shown in the screenshot on the next page.
  • 28. Extend Security Permission and Roles • Default Permissions • Default Roles • Create a Custom Role
  • 29. Default Permissions • Alfresco supports a number of permissions to access the spaces, content, properties, etc. The following are some of the permissions for spaces: – ReadProperties — Read space properties – ReadChildren — Read the content within a space – WriteProperties — Update properties such as title their description – DeleteNode — Delete space – DeleteChildren — Delete content and sub-spaces within a space – CreateChildren — Create content within a space • The following are some of the permissions for content items: – ReadContent — Read file – WriteContent — Update file – ReadProperties — Read file propertie – WriteProperties — Update file properties such as title, description, etc. – DeleteNode — Delete file – ExecuteContent — Execute file – SetOwner — Set ownership on a content item A complete list of default permissions and roles is provided in the Alfresco configuration file <config>modelpermissionDefinitions.xml.
  • 30. Default Roles • Roles are collections of permissions assigned to users in a specific space. Sub-spaces may inherit permissions from their parent space. Roles may also be applied to individual content items. The following table lists the default roles supported out of the box by Alfresco: Role Permission Consumer Read spaces and content Editor Consumer + edit existing content Contributor Consumer + add new content Collaborator Editor + Contributor Coordinator Full Control
  • 31. Global Permissions Excerpt from <config>modelpermissionDefinitions.xml <!-- --> <!-- Global permissions apply regardless of any particular node context. --> <!-- They can not be denied by the permissions set on any node. --> <!-- --> <!-- Admin can do anything to any ndoe --> <globalPermission permission=quot;FullControlquot; authority=quot;ROLE_ADMINISTRATORquot;/> <!-- For now, owners can always see, find and manipulate their stuff --> <globalPermission permission=quot;FullControlquot; authority=quot;ROLE_OWNERquot;/> <!-- Unlock is granted to the lock owner --> <globalPermission permission=quot;Unlockquot; authority=quot;ROLE_LOCK_OWNERquot;/> <!-- Check in is granted to the lock owner --> <globalPermission permission=quot;CheckInquot; authority=quot;ROLE_LOCK_OWNERquot;/> <!-- Cancel check out is granted to the locak owner --> <globalPermission permission=quot;CancelCheckOutquot; authority=quot;ROLE_LOCK_OWNERquot;/>
  • 32. Create a Custom Role You can add a new custom role as per your security requirements. You will have to include details of the custom role in permissionDefinitions.xml, which is the permission definitions file located at <config>model <permissionGroup name=quot;TestRolequot; allowFullControl=quot;falsequot; expose=quot;truequot; > <includePermissionGroup permissionGroup=quot;Readquot; type=quot;sys:basequot; /> <includePermissionGroup permissionGroup=quot;AddChildrenquot; type=quot;sys:basequot;/> <includePermissionGroup type=quot;cm:lockablequot; permissionGroup=quot;CheckOutquot;/> </permissionGroup>
  • 33. Secure Your Spaces • User Roles on a Space • Invite Users to Your Space • Define and Secure Your Spaces
  • 34. User Roles on a Space Permission Consume Contributor Editor Collaborato Coordinator r r Read Content X X X X X within space Read Space X X X X X Properties Read Sub-spaces X X X X X Read Forums, X X X X X Topics, Posts Copy X X X X X Preview in Template X X X X X Create Content X X X within space Create Sub-Spaces X X X Create Forums, X X X Topics, Posts
  • 35. Permission Consume Contributor Editor Collaborato Coordinator r r Reply to Posts X X X Start Discussion X X X Edit Space's X X X Properties Add/Edit Space X X X users Delete Space users X Add/Edit Space X X X rules Delete Space rules X Cut Content/ Sub- X Spaces Delete X Content/Sub- Spaces Check-out Content X X X Update Content X X X Take Ownership X
  • 36. Invite Users to Your Space • You can grant permission the users (or groups) to do specific tasks in your space. You do this by inviting users to join your space. Each role applies only to the space in which it is assigned. For example, you could invite a user (or group) to one of your spaces as an editor. You could invite the same user (or group) to a different space as a collaborator. That same user (or group) could be invited to someone else's space as a coordinator.
  • 37. Invite Users to Your Space #2 1. Click on the Company Home menu link in the tool bar (top left). 2. In the header click the Create | Create Space link. 3. Create a new space called Intranet. 4. Within the Intranet space create a sub-space called Finance Department. Ensure that you are in the Finance Department space. 5. In the space header, click More Actions | Manage Space Users. The Manage Space Users pane appears as shown in the following screenshot:
  • 38. Invite Users to Your Space #3 6. Leave the Inherit Parent Space Permissions option as checked (selected). When it is not selected, uninvited users cannot see the content item. Only invited users can see the content item, and can access it according to their assigned role. 7. In the header, click the Invite link. The Invite User Wizard pane appears as shown in the following screenshot:
  • 39. Invite Users to Your Space #4 8. Before continuing with your invitation, you can experiment with the Search feature. Select the Groups from the drop-down box and click on the Search button. 9. From the search results, select the Finance group, give it the Coordinator role and click on the Add to list button. 10.The finance group is added to the list of invitees. 11.As an administrator of the Finance Department space, you can invite the Finance group as coordinator (full access) and the Sales and Executive groups as consumer (read access). 12.Click on the Next button to go to the second pane, where you can notify the selected users.
  • 40. Invite Users to Your Space #5 13.Do not select this option as you do not have to notify these selected users in this sample. Click on the Finish button to confirm. Notice the permissions given to the groups on this space as shown in the screenshot below:
  • 41. Define and Secure Your Spaces • In the example above, you created a space called Finance Department and you gave the Coordinator role (full control) to the Finance group and gave the Consumer role (read access) to the Sales and Executive groups. • Next, go to your Company Home | Intranet space and create spaces as given in the first column of the table overleaf. Invite groups and assign roles as indicated in the second column of the table on the next slide :
  • 42. Define and Secure Your Spaces Space Name Group (Assigned Role) Individual (Assigned Role) Executive and Board Executive (Coordinator) Company Policies ● HR (Coordinator) ● EVERYONE (Consumer) Press and Media ● Corporate Communications (Coordinator) ● EVERYONE (Consumer) Marketing ● Marketing (Coordinator) Communications ● EVERYONE (Consumer) Sales Department ● Sales (Coordinator) Mr. CEO (Coordinator) ● Executive (Consumer) Finance Department ● Finance (Coordinator) ● Sales (Consumer) ● Executive (Consumer) Engineering Department ● Engineering Mrs. Presales (Coordinator) (Coordinator) ● EVERYONE (Consumer)
  • 43. Secure Your Content • User Roles for Content • Invite Users to Your Content
  • 44. User Roles for Content • Alfresco uses roles to determine what a user can and cannot do with the content. These roles are associated with permissions. The table below shows each role and the permissions for that role for content: PermissionsX Consumer Contributor Editor Collaborator Coordinator Read Content X X X X X Read Content Properties X X X X X Copy X X X X Preview in Template X X X X X Start Discussion X X X Edit Content X X X Edit Properties X X X Apply Versioning X X X Apply Categorization X X X Check-out X X X Update X X X Take ownership X Cut X Delete X
  • 45. Invite Users to Your Content • Typically security and access control rules are defined at the space level. It is not advised to secure individual content items as it may become unmanageable with large numbers of files. It is the best practice to secure the parent space rather than securing the content itself. However, you can still control the access to a specific content item. • Follow the steps below to invite users to your content item: 1. Go to a space and add a file by clicking on the Add Content link. 2. Click on the View Details icon for the file to see the detailed view of the content. 3. From the right-hand side Actions menu, click on the Manage Content Users link, to assign users to this content item for collaboration. 4. Search and select a user and assign a Collaborator role to the user.
  • 46. Choosing the Right Security Model for You • Use Alfresco Out-of-the-Box Membership System • Configuring LDAP for Centralized Identity Management • Configuring NTLM for Single Sign-on It is very important to choose a suitable security model at the beginning of Alfresco implementation. The authentication mechanism, user profile data storage, security settings, business rules, etc. are all based on the security model you choose.
  • 47. The Scenario Scenario 1: I would like to build an extranet as a stand-alone application to share documents with my customers. I have over 500 customers who will access the site, and I would like to control and manage the security. I need a flexible and highly scalable membership system. In this scenario, the out-of-the-box Alfresco membership system would be able to solve the problem. I work in the IT department of a large university. Over the years, the various departments have developed their own sites with local authentication and authorization. Our university has a directory-based central authentication system. How can I consolidate all the sites and provide a central point of authentication and authorization for all our sub-sites? In this scenario, it would make sense configure Alfresco with LDAP for centralized identity management.
  • 48. Use Alfresco Out-of-the-Box Membership System • Alfresco out of the box security includes the following functionality: – User management – Provision of user personal information – User authentication – Group management – Ownership of nodes within repository – An extendable permission model – Access control, to restrict call to public services authenticated users
  • 49. Configuring LDAP for Centralized Identity Management • There are three parts to Alfresco LDAP configuration – Authentication – Scheduled jobs for loading people and groups – The authentication context (which configures LDAP authentication and how people and groups are extracted from LDAP). A template configuration is provided in alfresco/extensions/ldap‐authentication- context.xml.sample.
  • 50. Configuring NTLM for Single Sign-on A template configuration is provided in alfresco/extensions/ntlm‐authentication-context.xml.sample. To enable NTLM authentication you need to edit the web.xml file (the location of the file depends on the application server used) and uncomment <filter> elements for NTLM. To enable NTLM pass-through you need to replace the file <config>/authentication-services-context.xml with the <config>/ authentication-services-context.ntlm file.
  • 51. Migrate Existing Users to Alfresco • Using Command-Line Scripts to Bulk Upload Users • Bootstrapping the Alfresco Repository with Pre-Defined User Data • Using Web Services API to Create Users
  • 52. Using Command-Line Scripts to Bulk Upload Users person.xml • Create xml file <?xml version=quot;1.0quot; encoding=quot;UTF-8quot;?> <view:view xmlns:d=quot;http://www.alfresco.org/model/dictionary/1.0quot; xmlns:cm=quot;http://www.alfresco.org/model/content/1.0quot; xmlns:view=quot;http://www.alfresco.org/view/repository/1.0quot;> <cm:person view:childName=quot;cm:personquot;> <cm:userName>fredb</cm:userName> <cm:firstName>Fred</cm:firstName> <cm:lastName>Bloggs</cm:lastName> <cm:email>fredb@alfresco.org</cm:email> </cm:person> <cm:person view:childName=quot;cm:personquot;> <cm:userName>sues</cm:userName> <cm:firstName>Sue</cm:firstName> <cm:lastName>Sanderson</cm:lastName> <cm:email>sues@alfresco.org</cm:email> </cm:person> </view:view>
  • 53. Using Command-Line Scripts to Bulk Upload Users java -classpath classes; librepository.jar;libcore.jar;libspring.jar; libjibx-run.jar;libxpp3.jar;libcommons-logging.jar; libehcache-1.1.jar;libdom4j-1.6.1.jar;libacegi-security-0.8.2.jar; libhibernate3.jar;libquartz.jar;libpdfbox-0.7.2.jar; libpoi-2.5.1.jar;libjooconverter.jar;libjid3lib-0.5.jar; libfreemarker.jar;liblog4j-1.2.8.jar;libcryptix-jce-provider.jar; libcommons-codec-1.2.jar;lib commons-dbcp-1.2.1.jar;libcommons‐pool.jar;libjta.jar; libmail.jar;libactivation.jar;libjug.jar;lib commons-collections-3.0.jar; libcglib-nodep-2.1.jar;libantlr-2.7.5H3.jar; libtm-extractors-0.4_patched.jar;libridl.jar; libjuh.jar;libjurt.jar;libsandbox.jar;libjut.jar; liblucene-1.4.3.jar;......commonlib mysql-connector-java-3.1.12-bin.jar; libsaxpath.jar;libjaxen-1.1-beta-8.jar org.alfresco.tools. Import -user admin -pwd admin -store workspace://SpacesStore -path sys:systemsys:people person.xml
  • 54. Bootstrapping the Alfresco Repository with Pre-Defined User Data • The Alfresco repository supports a bootstrap process, which is initiated whenever the repository is first started. The process populates the repository with information that is required upon first log in, such as system users, data dictionary definitions, and important root folders.
  • 55. Using the Web Services API to Create Users • You may also use the web services API to programmatically create users in Alfresco. This is useful if you already have another software application to manage users and you would like to create users in Alfresco from that application as needed.
  • 56. Summary • The Alfresco membership framework is very secure, flexible, scalable, and customizable. Roles are collections of permissions assigned to users (Consumer, Contributor, Editor, Collaborator, and Coordinator). You can manage system users and groups through the administration console. Security is imposed by assigning a role to a specific user or group for a specific space or content. Authentication is possible using Alfresco's built-in membership system, NTLM, and LDAP. You can bulk upload users to Alfresco using command-line utilities and the web services API.
  • 57. Reference • Alfresco, Enterprise Content Management Implementation, Munwar Sharif, PACKT Publishing