Security administration
The security functions in Content Manager control the user access to records and items held in the dataset.
Put simply, security is protection. It is the desire to prevent harm to something valuable. In the case of Content Manager, security protects information.
Apart from the obvious need to protect data from deliberate and accidental corruption, theft and destruction, there is also a need to control access to information in a manner that is agreeable to corporate requirements.
The most simplified corporate requirement is to provide a worker with access to relevant data (and controls) to complete tasks.
This suggests that the methods of security must be scalable from complete exclusion to need to know access, privileged access, and full access.
Content Manager provides a multitude of security options that determine group permission properties.
The options may apply to data objects (records, Locations, etc.), users (logons), class objects (Record Types), and data resources (support and configuration properties).
CAUTION: Availability of items in Content Manager depends on the combination of security, Access Controls and permissions that are set both on the item and for the user accessing the item. No security setting will override another security setting.
For example, a record may have multiple controls placed upon it to restrict access to it in various ways for different users - security levels, caveats, Access Controls and user type permissions. If the user does not have the same controls, they will not be able to view or modify the item.
Combinations of the security functions ensure that records can be held securely and can only be accessed by users with the permission to view or modify those records.
This control is managed in three ways:
See Applying security and Access Control defaults - Copy Style / Inheritance for details about setting defaults and the default Copy Style inheritance options.
These are the rules you can apply to control the inheritance of security levels, caveats and Access Controls by objects being created or modified.