IBM DB2 Content Manager security model essentials

Keep your ECM data secure

From the developerWorks archives

Naga Palasamudram, Suma Shastry, and Aruna Dadi

Date archived: January 12, 2017 | First published: November 15, 2007

IBM® DB2® Content Manager (CM) provides a flexible way of defining the security for your Enterprise Content Management (ECM) system. Depending on your business needs, you can design the security for your ECM system to be lenient or strict. CM provides various levels of security through authentication and authorization, and CM uses privilege sets and Access Control Lists (ACLs) to provide a stringent authorization mechanism. In this article, explore the methods for keeping your ECM data secure.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.

Zone=Information Management
ArticleTitle=IBM DB2 Content Manager security model essentials