Users who are granted the Manage Security permission can apply a granular set of permissions on nodes or items that allow individual users or a group of users access to specific actions.
By default, a new node or item does not contain any security policies which limit access to only administrators. When security policies are added on either a node or item, then the rights for a user are evaluated by explicit access along with access of groups a user is in, otherwise known as effective permissions.
Below is a listing of permissions that can be applied to create a security policy.
|
Permission |
Applied To |
Description |
|---|---|---|
|
Add Items |
Node |
Ability to create items in the target node. |
|
Add Sub Node |
Node |
Ability to add sub nodes in the target node. |
|
Edit Node |
Node |
Ability to rename and edit the target nodes properties. |
|
Edit Items |
Node |
*Ability to edit all items in the target node. |
|
Publish |
Node |
*Ability to publish all items in the target node. |
|
Delete Node |
Node |
Ability to delete target node. |
|
Delete Items |
Node |
*Ability to delete all items in the target node. |
|
View |
Node |
*Ability to view items in the target node. |
|
Node Security |
Node |
Ability to manage security policies on the target node. |
|
Item Security |
Node |
*Ability to manage security policies on all items in the target node. |
|
Edit |
Item |
Ability to edit a target item. |
|
Publish |
Item |
Ability to publish a target item. |
|
View |
Item |
Ability to view a target item. |
|
Security |
Item |
Ability to manage security policies on the target item. |
* Permissions carry down to the item level and is evaluated along with any explicit security policies on the item.