Found 959 results for "gitana 4.0 engine security access-policies conditions type"
The search executed in 0.002569267 seconds. That's fast.
![]() |
Gitana 4.0 / Self Managed / Containers / API ServerOptimize your API server configuration with Cloud CMS. Launch a Java app with REST API support for MongoDB, ElasticSearch, and Amazon services like S3, SNS, SQS, and more.
Score: 1.7175997
|
![]() |
Gitana 3.2 / Guide / Guide / Single Sign On (SSO) / JWTLearn how to configure Cloud CMS for JWT with an easy step-by-step guide. Integrate single sign-on (SSO) using JWT effectively.
Score: 1.7081401
|
![]() |
Gitana 3.2 / Guide / Guide / Bulk Import / JSONEasily import JSON content into Cloud CMS with our bulk import tool, creating structured content from legacy systems.
Score: 1.7005388
|
![]() |
Gitana 4.0 / Content Engine / Bulk Import / JSONImport JSON content into Cloud CMS repositories easily with the Bulk Import tool. Use JSON Schema for custom content types, like World Cup players.
Score: 1.7005388
|
![]() |
Create a RoleCloud CMS lets you create custom roles for your organization. A role provides a mechanism for setting up security and access rights to your content. Roles also play an important part in customizing the user interface. Cloud CMS comes with several roles out of the box. You can also create your own at any time. To create and modify roles, you must be logged in as a manager or an administrator of your platform. Here are the steps to follow: Log into Cloud CMS and either create a project or navigate
Score: 1.6989175
|
![]() |
Limiting Folder Access to Specific UsersWhen you create a Project in Cloud CMS, the Project is automatically configured with a Project Users team that grants the Consumer role to any project members. As a result, any members of the Project will have the ability to see all content within the Project. For many, this works just fine. However, there may be cases where you want to limit certain Folders to only be accessible by specific Users. Let's walk through some steps on how to do this. Change the Project Users team security policy Fir
Score: 1.6943241
|
![]() |
Gitana 3.2 / Guide / Guide / Application Server / Authentication / Providers / LocalLocal Authentication Provider connects your Node.js app with a custom identity provider, supporting secure login and authentication configuration.
Score: 1.685737
|
![]() |
Gitana 4.0 / Developers / Application Server / Authentication / Providers / LocalEnable seamless local authentication on Cloud CMS with a custom identity provider configured using Node.js or any technology.
Score: 1.685737
|
![]() |
Gitana 4.0 / Forms / CMS / Fields / File PickerOptimize file and folder navigation with our Cloud CMS file picker for seamless integration and easy customization.
Score: 1.6792552
|
![]() |
How does security work in Cloud CMS?Cloud CMS provides two ways to describe access rights to things: Object-level / role-based authorities Team / role-based authorities With object-level / role-based authorities, you assign a principal (either a user or a group) a role against something. For example, you might give Joe the CONSUMER role against a content node. When Joe then interacts with the content node in the future, he will do so with the CONSUMER role which will allow him to "read" the node. With team / role-based authorities
Score: 1.6754609
|
![]() |
Gitana 3.2 / Guide / Guide / Docker / Kits / OEMOptimize Cloud CMS integrations with the OEM kit, featuring UI and API extensions for developers and partners. Build and test seamlessly.
Score: 1.6636301
|
![]() |
Gitana 4.0 / Self Managed / Kits / OEMOEM kit streamlines building and testing UI and API extensions in customized Cloud CMS solutions, using Docker and tools like MongoDB and Elasticsearch.
Score: 1.6636301
|
![]() |
Gitana 3.2 / Guide / Guide / DockerOptimize your Cloud CMS deployment with Docker, offering flexible development and production setups on-premise or via virtual private clouds.
Score: 1.6531136
|
![]() |
Managing a large number of PDFs or imagesIn Cloud CMS everything is a node. A node has JSON properties and could also have binary attachments. What you would call a "file" is a node with properties describing it's folder location and a "default" attachment holding the payload (PDF file, image, MSWord doc, etc). Typically, for large number of PDFs, images, etc, we suggest individual nodes with a single attachment each (which is the PDF, image, etc). We have many customers who use Cloud CMS in this way and it essentially works like a doc
Score: 1.6469394
|
![]() |
Easy Forms with Cloud CMSOne of the many uses of Cloud CMS is as a storage and reporting mechanism for forms. If you’re looking to put a form up onto your web or mobile site, Cloud CMS serves as an excellent option for capturing and storing this information. Fundamentally, Cloud CMS provides the Alpaca forms engine. Alpaca is an open-source JavaScript library for jQuery. It makes it easy to design and insert forms into your sites. Cloud CMS built Alpaca and been working with the broader community to improve it and make
Score: 1.6469394
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / System Policies / project-managerDiscover Gitana's System Access Policy for project management. Enhance access control with JSON-based policies.
Score: 1.6468786
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / System Policies / project-ownerExplore the Gitana System Access Policy for project-owner, detailing JSON configuration and role-based permissions.
Score: 1.6468786
|
![]() |
Gitana 3.2 / Guide / Guide / Docker / Kits / MongoDB Replica SetSet up a 3-node MongoDB Replica Set with ease, using our guide, Gitana SDK, and Docker Compose for optimal database performance.
Score: 1.6460675
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / System Policies / project-connectorExplore the Gitana System Access Policy for project-connector, detailing JSON roles and actions for resource connection in projects.
Score: 1.6425415
|
![]() |
Recommended Cloud CMS architectureIn general, we recommend a three-tier architecture (browser -> app server -> API) for any applications you build. This would be our recommendation whether you're using Cloud CMS or anyone else. There are a few good reasons: The browser is an insecure runtime. Exposing any API keys within the browser is a very big security hole. Even exposing credentials within the browser (such as within a cookie) for the sake of working around this is also not recommended since hackers can siphon off the creden
Score: 1.6390061
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / System Policies / project-application-userDiscover the 'project-application-user' system access policy for managing project roles and permissions effectively.
Score: 1.6339355
|
![]() |
Role-based security accessYou can configure a Cloud CMS project to provide precise, role-based access to content types and content instances. Let's take a look at example of how this is done! Suppose that you have three users - Jim, Dwight and Michael - and two content types (my:article and my:news). We would like things to work like this: Michael is the boss. He is allowed to view, create, edit and delete content content of all types. Dwight is a worker. He is allowed to view, create, edit and delete content of type "my
Score: 1.6168897
|
![]() |
Gitana 3.2 / Guide / Guide / Content Modeling / Content Model Builder / Extend Field TemplatesExtend your field templates by adding custom modules like the Summernote WYSIWYG editor, elevating content editing flexibility and customization.
Score: 1.6086498
|
![]() |
Gitana 4.0 / Content Engine / Content Models / Content Model Builder / Extend Field TemplatesEnhance your web editing with custom field templates using Summernote WYSIWYG in just a few steps. Access the full guide and code example here.
Score: 1.6086498
|
![]() |
Dynamic ProxyPassReverseCookieDomain with Apache 2We do a lot of HTML5 and JavaScript application hosting at Cloud CMS. Our platform lets you build HTML5 applications and deploy them to our cloud infrastructure with just a couple of clicks. As a result, we’ve gotten pretty friendly with Apache 2, virtual hosts, mod_rewrite, proxies and more. Applications built on our platform use OAuth2 over SSL. We support all of the authentication flows even for HTML5/JS applications. Inherently, these applications are considered “untrusted” in any two-legged
Score: 1.6064789
|