Folders Structure Naming Folders Folders Component Security
6.1.3 Folders Structure
The following structure is used for Folders: ■ Each content server instance has a common set of virtual folders. Any change to the folders is applied system-wide. ■ There is one default system-level folder, called Contribution Folders. – The Trash Bin function is enabled during installation with a system-level folder called Trash created. ■ The system administrator can change the name of a system-level folder, but cannot delete it or add a custom system-level folder except through changes to the database. Deleting a system-level folder disables it, but does not remove it from the system. 6-4 Application Administrators Guide for Content Server ■ Each folder in the hierarchy contains content items that have the same numerical Folder value, which is assigned automatically upon creation of the folder. Changing the value of the Folder field for a content item places it in a different folder. ■ The maximum number of folders and content items in each folder can be limited so that browsing through virtual folder does not affect system performance.6.1.4 Naming Folders
The Folders component mimics the Windows file system. Therefore, when you create a folder, you are not allowed to use double quotes in the name for example, doublequotedfolder. Using double quotes will cause an error. You must use the standard naming conventions for Windows when creating folders.6.1.5 Folders Component Security
The Folders component applies security at two levels: ■ Content item level ■ Folder level6.1.5.1 Content Item Security
The user logins and security controls in Content Server also apply to content that is managed through virtual folders. For example, if you have Read permission for a content item, you will be able to view the file, but you will not be able to check in a revision to the file. To allow users with Read permission to access content through a virtual folder, the GetCopyAccess environment variable must be set. This can be selected in the Admin Server from the Content Security page by selecting the Allow get copy for user with read privilege checkbox.6.1.5.2 Folder Security
In addition to content item security, security is also applied at the folder level: ■ Users can see only the virtual folders that are assigned no security group or a security group for which they have at least Read permission. ■ Each virtual folder has an owner, which is a user who has permission to manage the folder. The owner can change a folders metadata and delete the folder, even if they do not have Write or Delete permission to the folders security group. However, the owner does not have additional permissions to content items within the folder. ■ To change a folders default metadata, you must have Delete permission to the folder or you must be the owner of the folder. ■ To delete a folder, you must have Delete permission to the folder or you must be the owner of the folder. You must also have permission to delete all of the content items and subfolders in that folder. Caution: Be careful when changing the security group of a folder. If you change a folder to a more restrictive security group, authors may no longer have permission to manage their own content items. Managing Folders and WebDAV 6-56.1.6 Folder Metadata Inheritance
Parts
» Oracle Fusion Middleware Online Documentation Library
» About Native File Conversion Identifying MIME Types
» About Custom Fields Managing Content Fields
» Changing the Default Sort Order of the Opening Query
» About Managed Links Managing Linked Content with Link Manager
» Configuring Link Manager Managing Linked Content with Link Manager
» Managing Links Managing Linked Content with Link Manager
» Link Manager Database Tables
» Link Manager Filters Managing Linked Content with Link Manager
» Site Studio Integration Managing Linked Content with Link Manager
» Click Go located next to the Abort refresh activity option. The refresh activity
» About DCLs and Metadata Schemas
» About Content Profiles Using Profiles to Customize Content Screens
» Content Profile Rules Using Profiles to Customize Content Screens
» Click OK. Oracle Fusion Middleware Online Documentation Library
» Select the Is global rule with priority check box. You can optionally change the
» On the Conditions tab, click Add. Click OK. Click OK. Click OK. Click OK.
» Workflow Overview Introduction to Workflows
» Workflow Steps Introduction to Workflows
» Workflow Step Evaluation Process
» Pre-design Questions Planning a Workflow
» Designing a Workflow Modifying Workflows
» Criteria Workflow Process Creating a Criteria Workflow
» Basic Workflow Process Creating a Basic Workflow
» Idoc Script Functions and Variables
» About Jumps Customizing Workflows
» Jump Variables and Steps Setting Up Jumps
» Jump Examples Customizing Workflows
» Scenario 1: Criteria Workflow Workflow Scenarios
» Scenario 2: Tokens Scenario 3: Jump Based on Metadata Scenario 4: Time-Dependent Jump
» Acquiring a Digital Signature Setting Up Parallel Workflows
» Adding Ad Hoc Step Users Customizing Criteria Workflow Emails
» Paste the following code into the entry event of your workflow step. Note that
» Other Customizations Workflow Tips and Tricks
» Searching Within a Workflow Step Suppressing Workflow Notifications
» Workflow Item Stuck in EDIT or GENWWW Status
» Workflow Item Entered in Wrong Workflow
» About PDF Watermark How PDF Watermark Works
» Folders Overview Usage Scenarios
» Folders Structure Naming Folders Folders Component Security
» Folder Metadata Inheritance Trash Bin Metadata Propagation
» Folder Content Item Revisions
» Folder Archiving Folder Searching URL-Mapped Folders
» About WebDAV What is WebDAV?
» WebDAV Clients WebDAV Architecture
» Preventing Folder Static Inheritance for Specific Metadata Fields
» Optimizing System Performance Click OK.
» Virtual Folders Configuring WebDAV
» Other Issues Click OK twice to save the settings and close the Internet Options screen.
» Adding Custom Viewers and Renderers
» Content Tracker Summary About Content Tracker Components and Functions
» Content Tracker Reports Summary Data Recording Overview
» Data Reduction Overview Data Reporting Overview Content Tracker Terminology
» General Limitations General Considerations
» Data Collection and Processing
» Data Collection Operational Overview
» Data Reduction Operational Overview
» Data Output Operational Overview
» Tracking Limitations Operational Overview
» Data Reduction Features Data Tracking Functions
» Activity Snapshots Data Tracking Functions
» Service Calls Data Tracking Functions
» Web Beacon Objects Data Tracking Functions
» Click the Snapshot tab. Click OK. Open the Content Tracker Administration page: Click OK.
» Oracle and DB2 Case Sensitivity Access Control Lists and Content Tracker Reports Secure Mode
» Pre-Defined Reports Report Generation
» Custom Reports External Report Generator
» User AuthenticationAuthorization and Auditing Site Studio Web Site Activity Reporting
» Security Checks and Query Results
» Accessing Drill Down Reports Accessing Reports from the Information Page
» Creating Custom Report Queries
» Creating Secure Report Queries Using an External Report Generator
» About the Service Call Configuration File
» About the Content Tracker Logging Service
» Managing Service Call Information
» Configuration Variables Configuration and Customization
» Activity Metrics SQL Queries
» Web Server Filter Debugging Support Java Code Debugging Support DataBinder Dump Facility
» Search Rules About Content Categorizer
» XML Conversion About Content Categorizer
» Configuration Variable Setting Up Content Categorizer
» Understanding Search Rules Search Rules
» Pattern Matching Search Rules
» Abstract Search Rules Search Rules
» Categorization Engine Search Rule Filetype Search Rule
» Translation Transformation Using XSLT Stylesheets
» SearchML Transformation XSLT Transformation
» Flexiondoc Transformation XSLT Transformation
Show more