Content Management Guide

     Previous  Next    Open TOC in new window    View as PDF - New Window  Get Adobe Reader - New Window
Content starts here

Managing Content Security

WebLogic Portal provides two ways to secure your content: delegated administration and visitor entitlements. Delegated administration controls who can edit content within your repository, while visitor entitlements control who can view content when it is displayed in your portal.

This chapter includes the following sections:

 


Using Delegated Administration for Content

Before starting to use the Virtual Content Repository, you can set up users, roles, and privileges to determine who can add, edit, or delete content. You use delegated administration roles to specify the users and groups that grant or deny access to resources and define which capabilities on those resources are available to administrators.

Before assigning content management resources to a delegated administration role, you must make sure the role exists. If no role exists, you must create it, then you can add users and content resources to it.

 


Setting Delegated Administration

You can set delegated administration rights at the repository level, folder level, or content item level.

If you set delegated administration rights at the repository or folder level, all children of that level inherit that delegated administration right. You cannot override a delegated administration right once it has been given. For example, if you give a delegated administration role rights to update content within a folder, you cannot remove that policy on an individual content item within the folder.

For detailed information about setting up delegated administration on content resources, see the WebLogic Portal Security Guide.

 


Setting Visitor Entitlements for Content

Visitor entitlements allow you to define who can access the content in your portal application and what they can do with it.

For more information about visitor entitlements on content resources, see the WebLogic Portal Security Guide.


  Back to Top       Previous  Next