On Sat, 26 Feb 2000, Lucas Vogel wrote:
Could someone point me out to some good documentation to explain security in Zope for me? I am trying to set up the GUF through my database, but I find I am having a hard time figuring out proxy logins and the like and would like to read up and have a good understanding of the Zope model before I start outsourcing it to my db.
Zope security is almost exactly like Unix security. A proxy role is like making a program run set-uid or set-gid. The only real difference is that your groups (Zope Roles) are not globally visible - they can be seen only in the folder they were created and subfolders. I can give a fuller explanation in about a week when things quieten down here a bit :-/ Who let these students back from holiday? -- ___ // Zen (alias Stuart Bishop) Work: zen@cs.rmit.edu.au // E N Senior Systems Alchemist Play: zen@shangri-la.dropbear.id.au //__ Computer Science, RMIT WWW: http://www.cs.rmit.edu.au/~zen