Secured Entities - ACS - Reference Guides

ACS Integration Guide

Product
ACS
Platform
7.9
Category
Reference Guides
Language
English
Target Audience
public

In CKS, a security process can be applied on secured entities.

Some resources in CKS require an access control process. The process defines the actions allowed on the resources. The access control depends on three components: rights, profiles, and permissions.

The entities covered by the access control process are secured entities. They mainly involve members and data.

By extension, the web services used to handle secured entities lists (for example users lists or folders lists) are also protected.