Book Image

Documentum Content Management Foundations: EMC Proven Professional Certification Exam E20-120 Study Guide

By : Pawan Kumar
Book Image

Documentum Content Management Foundations: EMC Proven Professional Certification Exam E20-120 Study Guide

By: Pawan Kumar

Overview of this book

This is a complete study guide including study material and practice questions to prepare for the EMC Proven Professional certification Exam E20-120. It can also serve Documentum beginners and practitioners as a handy guide and quick reference to the technical fundamentals that is fully up to date for Documentum 5.3. Beginners are introduced to concepts in a logical manner while practitioners can use it as a reference to jump to relevant concepts directly.EMC Documentum is a leading enterprise content management technology platform that helps enterprises to streamline the capture, processing, and distribution of business information including documents, records, e-mails, web content, images, reports, and digital assets. It can also automate entire business processes in accordance with business rules. EMC Proven Professional is an exam-based certification program, which introduced a new EMC Proven Content Management Application Developer (EMCAD) track in early 2007. The first exam in this track is Content Management Foundations (CMF) Associate-level Exam, with exam code E20-120, which tests knowledge about technical fundamentals of Documentum. This book is a study guide to help you prepare for this exam with hundreds of practice questions and an efficient exam-preparation strategy.
Table of Contents (23 chapters)
Documentum Content Management Foundations
Credits
About the Author
Acknowledgement
About the Reviewers
Preface

Chapter 5. Users and Privileges

In this chapter, we will explore the following concepts:

  • A high-level view of Documentum security

  • Users and authentication

  • User authorization including privileges and client capabilities

  • User management

Documentum Security

At a high level, the security model in Documentum is similar to that used in contemporary enterprise applications. There are resources (information, objects) that need to be secured, there are operations that can be performed on the resources, and there are users who wish to perform these operations. The security configuration defines what is allowed for various combinations of users, operations, and resources. At run time, a user attempts to perform an operation and the components of the Documentum architecture resolve rules for the specific user, operation, and resource combination to allow or disallow the attempted operation.

At a detailed level, security implementation is very specific to the Documentum architecture. This is the first chapter...