Found 555 results for "access-policies conditions id"
The search executed in 0.001650132 seconds. That's fast.
![]() |
Gitana 3.2 / Guide / Guide / ConditionsExplore Cloud CMS Conditions for enhancing content evaluation with rules, using simple checks to complex logic, and an array of ready-made options.
Score: 21.176384
|
![]() |
Gitana 4.0 / Content Engine / Behaviors / ConditionsExplore Cloud CMS Conditions for evaluating rules and environments with preset logic functions like 'and', 'or', and others for streamlined actions.
Score: 21.176384
|
![]() |
Gitana 4.0 / Content Engine / Single Sign On (SSO) / Azure Entra IDSet up Azure Entra ID for identity management and single sign-on using SAML 2.0 with Cloud CMS. Ensure secure and seamless access.
Score: 20.753729
|
![]() |
Gitana 4.0 / Content Engine / BehaviorsDiscover how content editors create, update, or delete content using simple forms, triggering custom behaviors like actions, conditions, policies, and rules.
Score: 14.541727
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / IDOptimize policy statements by using ID conditions with regex to apply specific roles to entities in your configuration.
Score: 14.455626
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / ConditionsExplore comprehensive access policy conditions for Gitana 4.0, including And, Branch, Changeset, Data Store, and more. Perfect for developers.
Score: 10.527532
|
![]() |
Gitana 3.2 / Guide / Guide / RulesAutomate your content management with rules in Cloud CMS. Trigger actions like converting files or updating properties using policy bindings and conditions.
Score: 10.524854
|
![]() |
Gitana 4.0 / Content Engine / Behaviors / RulesAutomate business logic with Cloud CMS Rules. Trigger actions on content creation, updates, or removal using flexible conditions and policies.
Score: 10.524854
|
![]() |
Gitana 3.2 / Guide / Guide / Single Sign On (SSO) / Azure Entra IDOptimize your identity management with Azure Entra ID and Cloud CMS SAML 2.0 integration, enhancing security and seamless single sign-on.
Score: 10.452792
|
![]() |
Gitana 3.2 / Guide / Guide / UI Developers Guide / Evaluators / idLearn how to determine if a current entity or viewed object matches a specific ID using code evaluators.
Score: 7.303664
|
![]() |
Gitana 4.0 / Developers / User Interface Customization / Evaluators / idLearn how to determine if a current entity or viewed object matches a specific ID using code evaluators.
Score: 7.303664
|
![]() |
Gitana 4.0 / Reference / Types / Status of Operation (with ID)Explore the status of operation with ID, and enhance development using language drivers and comprehensive guides for C#, Go, Java, and more.
Score: 4.0863533
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Templates / read-all-content-from-multiple-projectsOptimize access to multiple projects with Gitana's Access Policy Template. Manage and consume content easily from various sources.
Score: 3.6680765
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / ReferenceLearn how to use reference conditions in Cloud CMS to assign policies with regular expressions, focusing on specific or wildcarded entity references.
Score: 3.5396733
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Templates / read-all-content-from-all-projectsExplore the Gitana Access Policy Template, enabling management of all content across projects using the identifier read-all-content-from-all-projects.
Score: 3.323004
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Templates / read-all-content-from-a-single-projectDiscover how to implement a Gitana Access Policy Template for managing project content efficiently.
Score: 3.299837
|
![]() |
Enterprise Access Policies in Gitana 4.0 (Part 1)In this article, we'll take a look at Access Policies -- a powerful, new feature in Gitana 4.0 that allows organizations to set up and guarantee compliance with complex, enterprise-wide security requirements. Access Policies build upon the existing access control facilities provided which include per-object ACLs and broader, team-based ACLs. They extend those capabilities by allowing administrators to express access rights in a broad sweeping and prescriptive manner -- one that allows for custom
Score: 3.2739882
|
![]() |
Gitana 4.0 / Content Engine / Access PoliciesDiscover how to configure robust access control policies using JSON to assign roles and conditions for users, groups, and teams on a platform.
Score: 3.2212753
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / ChangesetOptimize policy statements using changeset conditions with regex, focusing on nodes or associations within a specific ID for precise role applications.
Score: 3.1213098
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / TypeOptimize policy statements using the type condition for specific entities, supporting regex and focusing on IDs or wildcards.
Score: 3.101455
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / ProjectOptimize policy statements by targeting project IDs or titles with regex for precise access control.
Score: 3.0985227
|
![]() |
Enterprise Access Policies in Gitana 4.0 (Part 2)In this article, we'll continue our series on Access Policies within Gitana. We'll take a few interesting and more complex examples of how Access Policies may be used to guarantee compliance witih enterprise security requirements. In the previous article, we left off looking at how you can grant access to content using Access Policies that are defined at either a Platform or Project-level. Platform-scoped policies can be written once and applied across all of your Projects. In this way, you can
Score: 3.0744028
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / BranchEnhance policy management with branch conditions using regex for IDs, titles, or aliases. Learn to configure and apply precise constraints.
Score: 3.0541344
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / Data StoreOptimize policy statements for datastores using type, ID, or title with regex support for precise or wildcard matching.
Score: 3.0502594
|
![]() |
Gitana 4.0 / Content Engine / Access Policies / Conditions / PropertyDefine policy conditions using properties and regex to match specific values, ensuring targeted application across entities with precise property constraints.
Score: 3.0471983
|