O'Reilly logo

IBM FileNet Content Manager Implementation Best Practices and Recommendations by Dimitris Tzouvelis, Michael Seaman, Sridhar Satuloori, Elizabeth Koumpan, Ruth Hildebrand-Lund, Chuck Fay, Axel Dreher, Bill Carpenter, Bert Bukvarevic, Wei-Dong Zhu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security
This chapter describes the security mechanisms provided by the Content Platform Engine to secure the resources under its management against unauthorized access and to ensure that authorized users are given only sufficient access to carry out the tasks assigned to them, referred to as access control. In addition, it provides a series of recommendations for how best to employ those mechanisms to achieve the desired access control goals.
We discuss the following topics in the chapter:

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required