README.txt
Zope Security Audit Product README
Overview
Zope's fine-grained security model is powerful, but hard to manage. This tool gives the system administrator an overview of the security status of the site, by searching for "exceptions" to the default / acquired behavior. In particular, it flags all objects which meet have any of these criteria:
- Local role assigments;
- Proxy roles;
- Overridden permission mappings;
- Executable ownership which differes from the ownership of the 'aq_parent';
Owner
local roles which don't include the executable owner (leave outSystem Processes
for unowned).
Installation
- Untar the tarball, into the
Products
of your Zope instance (on the filesystem). - Restart Zope.
- Using the Zope management interface, create a
Security Audit
instance from the Add menu. - View the
Audit
tab of the instance.