Found 959 results for "gitana 4.0 engine security access-policies conditions type"

The search executed in 0.002569267 seconds. That's fast.

Gitana 4.0 / Self Managed / Containers / API Server

Optimize your API server configuration with Cloud CMS. Launch a Java app with REST API support for MongoDB, ElasticSearch, and Amazon services like S3, SNS, SQS, and more.

Score: 1.7175997

Gitana 3.2 / Guide / Guide / Single Sign On (SSO) / JWT

Learn how to configure Cloud CMS for JWT with an easy step-by-step guide. Integrate single sign-on (SSO) using JWT effectively.

Score: 1.7081401

Gitana 3.2 / Guide / Guide / Bulk Import / JSON

Easily import JSON content into Cloud CMS with our bulk import tool, creating structured content from legacy systems.

Score: 1.7005388

Gitana 4.0 / Content Engine / Bulk Import / JSON

Import JSON content into Cloud CMS repositories easily with the Bulk Import tool. Use JSON Schema for custom content types, like World Cup players.

Score: 1.7005388

Create a Role

Cloud CMS lets you create custom roles for your organization. A role provides a mechanism for setting up security and access rights to your content. Roles also play an important part in customizing the user interface. Cloud CMS comes with several roles out of the box. You can also create your own at any time. To create and modify roles, you must be logged in as a manager or an administrator of your platform. Here are the steps to follow: Log into Cloud CMS and either create a project or navigate

Score: 1.6989175

Limiting Folder Access to Specific Users

When you create a Project in Cloud CMS, the Project is automatically configured with a Project Users team that grants the Consumer role to any project members. As a result, any members of the Project will have the ability to see all content within the Project. For many, this works just fine. However, there may be cases where you want to limit certain Folders to only be accessible by specific Users. Let's walk through some steps on how to do this. Change the Project Users team security policy Fir

Score: 1.6943241

Gitana 3.2 / Guide / Guide / Application Server / Authentication / Providers / Local

Local Authentication Provider connects your Node.js app with a custom identity provider, supporting secure login and authentication configuration.

Score: 1.685737

Gitana 4.0 / Developers / Application Server / Authentication / Providers / Local

Enable seamless local authentication on Cloud CMS with a custom identity provider configured using Node.js or any technology.

Score: 1.685737

Gitana 4.0 / Forms / CMS / Fields / File Picker

Optimize file and folder navigation with our Cloud CMS file picker for seamless integration and easy customization.

Score: 1.6792552

How does security work in Cloud CMS?

Cloud CMS provides two ways to describe access rights to things: Object-level / role-based authorities Team / role-based authorities With object-level / role-based authorities, you assign a principal (either a user or a group) a role against something. For example, you might give Joe the CONSUMER role against a content node. When Joe then interacts with the content node in the future, he will do so with the CONSUMER role which will allow him to "read" the node. With team / role-based authorities

Score: 1.6754609

Gitana 3.2 / Guide / Guide / Docker / Kits / OEM

Optimize Cloud CMS integrations with the OEM kit, featuring UI and API extensions for developers and partners. Build and test seamlessly.

Score: 1.6636301

Gitana 4.0 / Self Managed / Kits / OEM

OEM kit streamlines building and testing UI and API extensions in customized Cloud CMS solutions, using Docker and tools like MongoDB and Elasticsearch.

Score: 1.6636301

Gitana 3.2 / Guide / Guide / Docker

Optimize your Cloud CMS deployment with Docker, offering flexible development and production setups on-premise or via virtual private clouds.

Score: 1.6531136

Managing a large number of PDFs or images

In Cloud CMS everything is a node. A node has JSON properties and could also have binary attachments. What you would call a "file" is a node with properties describing it's folder location and a "default" attachment holding the payload (PDF file, image, MSWord doc, etc). Typically, for large number of PDFs, images, etc, we suggest individual nodes with a single attachment each (which is the PDF, image, etc). We have many customers who use Cloud CMS in this way and it essentially works like a doc

Score: 1.6469394

Easy Forms with Cloud CMS

One of the many uses of Cloud CMS is as a storage and reporting mechanism for forms. If you’re looking to put a form up onto your web or mobile site, Cloud CMS serves as an excellent option for capturing and storing this information. Fundamentally, Cloud CMS provides the Alpaca forms engine. Alpaca is an open-source JavaScript library for jQuery. It makes it easy to design and insert forms into your sites. Cloud CMS built Alpaca and been working with the broader community to improve it and make

Score: 1.6469394

Gitana 4.0 / Content Engine / Access Policies / System Policies / project-manager

Discover Gitana's System Access Policy for project management. Enhance access control with JSON-based policies.

Score: 1.6468786

Gitana 4.0 / Content Engine / Access Policies / System Policies / project-owner

Explore the Gitana System Access Policy for project-owner, detailing JSON configuration and role-based permissions.

Score: 1.6468786

Gitana 3.2 / Guide / Guide / Docker / Kits / MongoDB Replica Set

Set up a 3-node MongoDB Replica Set with ease, using our guide, Gitana SDK, and Docker Compose for optimal database performance.

Score: 1.6460675

Gitana 4.0 / Content Engine / Access Policies / System Policies / project-connector

Explore the Gitana System Access Policy for project-connector, detailing JSON roles and actions for resource connection in projects.

Score: 1.6425415

Recommended Cloud CMS architecture

In general, we recommend a three-tier architecture (browser -> app server -> API) for any applications you build. This would be our recommendation whether you're using Cloud CMS or anyone else. There are a few good reasons: The browser is an insecure runtime. Exposing any API keys within the browser is a very big security hole. Even exposing credentials within the browser (such as within a cookie) for the sake of working around this is also not recommended since hackers can siphon off the creden

Score: 1.6390061

Gitana 4.0 / Content Engine / Access Policies / System Policies / project-application-user

Discover the 'project-application-user' system access policy for managing project roles and permissions effectively.

Score: 1.6339355

Role-based security access

You can configure a Cloud CMS project to provide precise, role-based access to content types and content instances. Let's take a look at example of how this is done! Suppose that you have three users - Jim, Dwight and Michael - and two content types (my:article and my:news). We would like things to work like this: Michael is the boss. He is allowed to view, create, edit and delete content content of all types. Dwight is a worker. He is allowed to view, create, edit and delete content of type "my

Score: 1.6168897

Gitana 3.2 / Guide / Guide / Content Modeling / Content Model Builder / Extend Field Templates

Extend your field templates by adding custom modules like the Summernote WYSIWYG editor, elevating content editing flexibility and customization.

Score: 1.6086498

Gitana 4.0 / Content Engine / Content Models / Content Model Builder / Extend Field Templates

Enhance your web editing with custom field templates using Summernote WYSIWYG in just a few steps. Access the full guide and code example here.

Score: 1.6086498

Dynamic ProxyPassReverseCookieDomain with Apache 2

We do a lot of HTML5 and JavaScript application hosting at Cloud CMS. Our platform lets you build HTML5 applications and deploy them to our cloud infrastructure with just a couple of clicks. As a result, we’ve gotten pretty friendly with Apache 2, virtual hosts, mod_rewrite, proxies and more. Applications built on our platform use OAuth2 over SSL. We support all of the authentication flows even for HTML5/JS applications. Inherently, these applications are considered “untrusted” in any two-legged

Score: 1.6064789