Found 144 results for "conditions merge"
The search executed in 0.00118205 seconds. That's fast.
![]() |
Gitana 4.0 / Content Engine / Access Policies / System Policies / platform-connectorExplore Gitana's 'platform-connector' System Access Policy for seamless platform connectivity management.
Score: 2.162244
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / NotExplore logical NOT operations in policy configurations; learn to allow actions excluding specific conditions, like excluding Spanish content.
Score: 2.1565766
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / System Policies / project-read-all-contentExplore Gitana's project-read-all-content policy that allows content reading in projects under specific conditions.
Score: 2.1565766
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Templates / read-all-contentAccess Policy Template for Gitana 4.0: Allow project members to consume all content with JSON configuration.
Score: 2.1565766
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / System Policies / project-read-all-pathsDiscover the project-read-all-paths policy for comprehensive access to content paths in Gitana, essential for system access management.
Score: 2.1453302
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / System Policies / platform-application-userExplore Gitana's System Access Policy for platform-application-user to manage application-level permissions efficiently.
Score: 2.1231856
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Templates / edit-all-content-in-spanishCreate and manage Spanish content with this Gitana access policy template for effortless editorial collaboration.
Score: 2.1231856
|
![]() |
Gitana 3.2 / Guide / GuideExplore comprehensive Gitana documentation covering APIs, authentication, security, workflow, and more to streamline your development process.
Score: 2.112284
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / TypeOptimize policy statements using the type condition for specific entities, supporting regex and focusing on IDs or wildcards.
Score: 2.112284
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Templates / manage-all-content-of-a-typeManage access policies with Gitana: Grant project members management rights for all content of a specific type.
Score: 2.112284
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Templates / read-all-content-with-a-featureExplore Gitana's Access Policy Template to grant consumers access to multi-feature content efficiently. Discover JSON syntax and customization.
Score: 2.112284
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Templates / edit-all-content-with-a-propertyLearn about Gitana's Access Policy Template for editing all content with a specific property value.
Score: 2.1014936
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Templates / read-all-content-in-a-folderExplore Gitana's Access Policy Template for reading all content in a folder, supporting consumer roles with path-specific permissions.
Score: 2.1014936
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / IDOptimize policy statements by using ID conditions with regex to apply specific roles to entities in your configuration.
Score: 2.090813
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / Type QNameOptimize policy statements using type-qname conditions for content nodes with QName constraints and regex support.
Score: 2.0802402
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / PropertyDefine policy conditions using properties and regex to match specific values, ensuring targeted application across entities with precise property constraints.
Score: 2.069774
|
![]() |
Gitana 4.0 / Getting Started / Working with Content / VersioningExplore Cloud CMS's changeset versioning, offering a Git-like, seamless, collaborative environment for content management without file locking issues.
Score: 2.0440485
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / ChangesetOptimize policy statements using changeset conditions with regex, focusing on nodes or associations within a specific ID for precise role applications.
Score: 2.0289412
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / ProjectOptimize policy statements by targeting project IDs or titles with regex for precise access control.
Score: 2.0091233
|
![]() |
Gitana 3.2 / Guide / Guide / UI Developers Guide / UI ViewsOptimize your interface with UI View configurations, tailoring user experiences by extending or overriding default settings at platform and project levels.
Score: 2.0078757
|
![]() |
Gitana 4.0 / Developers / User Interface Customization / UI ViewsCustomize UI easily with UI Views. Learn how to create scalable configurations for platform or project-level interfaces using JSON-based UI Views.
Score: 2.0078757
|
![]() |
Gitana 3.2 / Guide / Guide / ReportsGenerate reports and exports in CSV, PDF, or ZIP formats using Cloud CMS. Download, email, or store exports seamlessly.
Score: 1.9739429
|
![]() |
Gitana 4.0 / Content Engine / Nodes / ReportsGenerate reports and exports in CSV, PDF, or ZIP formats using Cloud CMS. Download, email, or store exports seamlessly.
Score: 1.9739429
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / BranchEnhance policy management with branch conditions using regex for IDs, titles, or aliases. Learn to configure and apply precise constraints.
Score: 1.9706264
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / Data StoreOptimize policy statements for datastores using type, ID, or title with regex support for precise or wildcard matching.
Score: 1.951926
|