IBM DB2 Content Manager security model essentials
Keep your ECM data secure
From the developerWorks archives
Date archived: January 12, 2017 | First published: November 15, 2007
IBM® DB2® Content Manager (CM) provides a flexible way of defining the security for your Enterprise Content Management (ECM) system. Depending on your business needs, you can design the security for your ECM system to be lenient or strict. CM provides various levels of security through authentication and authorization, and CM uses privilege sets and Access Control Lists (ACLs) to provide a stringent authorization mechanism. In this article, explore the methods for keeping your ECM data secure.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.