Book Image

Documentum Content Management Foundations: EMC Proven Professional Certification Exam E20-120 Study Guide

By : Pawan Kumar
Book Image

Documentum Content Management Foundations: EMC Proven Professional Certification Exam E20-120 Study Guide

By: Pawan Kumar

Overview of this book

This is a complete study guide including study material and practice questions to prepare for the EMC Proven Professional certification Exam E20-120. It can also serve Documentum beginners and practitioners as a handy guide and quick reference to the technical fundamentals that is fully up to date for Documentum 5.3. Beginners are introduced to concepts in a logical manner while practitioners can use it as a reference to jump to relevant concepts directly.EMC Documentum is a leading enterprise content management technology platform that helps enterprises to streamline the capture, processing, and distribution of business information including documents, records, e-mails, web content, images, reports, and digital assets. It can also automate entire business processes in accordance with business rules. EMC Proven Professional is an exam-based certification program, which introduced a new EMC Proven Content Management Application Developer (EMCAD) track in early 2007. The first exam in this track is Content Management Foundations (CMF) Associate-level Exam, with exam code E20-120, which tests knowledge about technical fundamentals of Documentum. This book is a study guide to help you prepare for this exam with hundreds of practice questions and an efficient exam-preparation strategy.
Table of Contents (23 chapters)
Documentum Content Management Foundations
Credits
About the Author
Acknowledgement
About the Reviewers
Preface

Authorization


In the last chapter, we introduced the concepts of authentication and authorization. For correct authentication each user must be identified uniquely. However, it is very common that multiple users play the same business role in an organization and need similar levels of access. If access is granted to each user separately, it may become difficult to manage the access control due to the following reasons:

  1. 1. There are a large number of users and/or resources to be secured.

  2. 2. All the users with similar access levels need to be assigned new permissions.

For example, a department may have 100 employees, where all the users need similar access levels to a set of documents. Configuring the same access repeatedly for 100 users is inefficient. Further, if this access needs to be changed (or taken away) for all of these users, it requires the same laborious process again.

Both of these scenarios lead to repeated work of the same kind that deserves to be automated and simplified. A group...