Standard permissions and roles

Description

Technical overview of Plones standard permissions and roles.

Standard permissions

The standard permissions can be found in AccessControl's and Product.CMFCore’s permissions.zcml. Here, you will find a short id (also known as the Zope 3 permission id) and a longer title (also known as the Zope 2 permission title). For historical reasons, some areas in Plone use the id, whilst others use the title. As a rule of thumb:

  • Browser views defined in ZCML directive use the Zope 3 permission id;

  • Security checks using zope.security.checkPermission() use the Zope 3 permission id;

  • Dexterity’s add_permission FTI variable uses the Zope 3 permission id;

  • The rolemap.xml GenericSetup handler and workflows use the Zope 2 permission title;

  • Security checks using AccessControl’s getSecurityManager().checkPermission(), including the methods on the portal_membership tool, use the Zope 2 permission title.

The most commonly used permission are shown below. The Zope 2 permission title is shown in parentheses.

zope.Public (Public)

special permission indicating unconditional access, public resources are always accessible;

zope2.View (View)

used to control access to the standard view of a content item;

zope2.DeleteObjects (Delete objects)

used to control the ability to delete child objects in a container;

cmf.ModifyPortalContent (Modify portal content)

used to control write access to content items;

cmf.ManagePortal (Manage portal)

used to control access to management screens;

cmf.AddPortalContent (Add portal content)

the standard add permission required to add content to a folder;

cmf.SetOwnProperties (Set own properties)

used to allow users to set their own member properties’

cmf.RequestReview (Request review)

typically used as a workflow transition guard to allow users to submit content for review;

cmf.ReviewPortalContent (Review portal content)

usually granted to the Reviewer role, controlling the ability to publish or reject content.

Standard roles

As with permissions, it is easy to create custom roles (use the rolemap.xml GenericSetup import step – see CMFPlone’s version of this file for an example), although you should use the standard roles where possible.

The standard roles in Plone are:

Anonymous

a pseudo-role that represents non-logged in users.

Note

if a permission is granted to Anonymous, it is effectively granted to everyone. It is not possible to grant permissions to non-logged in users without also granting them to logged in ones.

Authenticated

a pseudo-role that represents logged-in users.

Owner

automatically granted to the creator of an object.

Manager

which represents super-users/administrators. Almost all permissions that are not granted to Anonymous are granted to Manager.

Site Manager

which represents site/administrators. Has permissions needed to fully manage a single Plone site.

Reviewer

which represents content reviewers separately from site administrators. It is possible to grant the Reviewer role locally on the Sharing tab, where it is shown as Can review.

Member

representing “standard” Plone users.

In addition, there are three roles that are intended to be used as local roles only. These are granted to specific users or groups via the Sharing tab, where they appear under more user friendly pseudonyms.

Reader, aka Can view,

confers the right to view content. As a rule of thumb, the Reader role should have the View and Access contents information permissions if the Owner roles does.

Editor, aka Can edit,

confers the right to edit content. As a rule of thumb, the Editor role should have the Modify portal content permission if the Owner roles does.

Contributor, aka Can add,

confers the right to add new content. As a rule of thumb, the Contributor role should have the Add portal content permission and any type-specific add permissions globally (i.e. granted in rolemap.xml), although these permissions are sometimes managed in workflow as well.