Users who are granted the Manage Security permission can apply a granular set of permissions on nodes or items that allow individual users or a group of users access to specific actions.
By default, a new node or item does not contain any security policies which limit access to only administrators. When security policies are added on either a node or item, then the rights for a user are evaluated by explicit access along with access of groups a user is in, otherwise known as effective permissions.
Below is a listing of permissions that can be applied to create a security policy.
Permission |
Applied To |
Description |
---|---|---|
Add Items |
Node |
Ability to create items in the target node. |
Add Sub Node |
Node |
Ability to add sub nodes in the target node. |
Edit Node |
Node |
Ability to rename and edit the target nodes properties. |
Edit Items |
Node |
*Ability to edit all items in the target node. |
Publish |
Node |
*Ability to publish all items in the target node. |
Delete Node |
Node |
Ability to delete target node. |
Delete Items |
Node |
*Ability to delete all items in the target node. |
View |
Node |
*Ability to view items in the target node. |
Node Security |
Node |
Ability to manage security policies on the target node. |
Item Security |
Node |
*Ability to manage security policies on all items in the target node. |
Edit |
Item |
Ability to edit a target item. |
Publish |
Item |
Ability to publish a target item. |
View |
Item |
Ability to view a target item. |
Security |
Item |
Ability to manage security policies on the target item. |
* Permissions carry down to the item level and is evaluated along with any explicit security policies on the item.