Granting access to content using the Access Settings

Related videos

Access settings give you a consistent way to apply security (grant permissions) to folders and objects throughout iMIS:

  • Content records
  • Entire websites
  • Individual navigation items
  • Queries
  • And the wide array of objects that you can define, import, and store in the Document System

Understanding the different options

From the Access settings tab, there are two radio buttons: Use a preconfigured security set and Make this available to

Use a preconfigured security set

Throughout iMIS, whenever you configure access settings, you see a drop-down list of available security settings that you can apply to individual folders and objects. These security sets offer you easier control and faster performance than defining custom ones.

These are the key security sets you should use, from most permissive to least:

  • Everyone — No restrictions, including the public (if they can access this level/context).
  • Authenticated Users — Restricts access to users who are signed in (both staff and public members).
  • All Staff Full Control — Restricts access to staff users.
  • Administrators Full Control — Restricts access to users with the SysAdmin role.

Note: If you do not have the feature named in the security set (such as Certification), do not use the set.

iMIS ships with these pre-built security sets to cut down on the customization you need, for objects that should be neither unsecured (Share) nor locked for you alone (Private). Each security set contains a predefined Access List and permissions (Full Control, Read, Add, Delete, Edit) that are constant for all objects that use it. A Select permission is also available for tagged objects.

When you choose a set, the Current Access List below it updates to show the settings it includes. Look at those details to decide if the selected security set has the permissions you need.

Make this available to

Allows you to restrict the content to specific roles, groups, users and member types. When this option is selected, you will see the Specific roles section has Content Administrator and SysAdmin automatically selected. These are default system-defined security roles that are assigned to every content record:

  • SysAdmin - Anyone with the SysAdmin role.
  • but the Content Administrator role is automatically assigned to every iMIS user who is a member of a content authority group (CAG) that is designated as a Master Admin CAG.

The permissions that can be assigned to each entry in the list are:

  • Full Control - Enables all of the following permissions.
  • Read - Enables users to see this object both in definition windows and as rendered output in websites, but they cannot change the object's definition.
  • Add - Enables users to create new objects, or to paste or import an object into the Document system.
  • Edit - Enables users to edit this object's definition, but not to delete the object.
  • Delete - Enables users to delete this object.
  • Select - Enables users to assign a tag to content folders and content records.
  • Note: These permissions are only used with Content Authority Groups. To see how they are used with CAG, please see Defining content authority groups.

Examples

Review the following examples to better understand how to use the Access settings options.