README.txt
Zope Security Audit Product README
Overview
Zope's fine-grained security model is powerful, but hard to manage. This tool gives the system administrator an overview of the security status of the site, by searching for "exceptions" to the default / acquired behavior. In particular, it flags all objects which meet have any of these criteria:
- Local role assigments;
- Proxy roles;
- Overridden permission mappings;
- Executable ownership which differes from the ownership of the 'aq_parent';
Ownerlocal roles which don't include the executable owner (leave outSystem Processesfor unowned).
Installation
- Untar the tarball, into the
Productsof your Zope instance (on the filesystem). - Restart Zope.
- Using the Zope management interface, create a
Security Auditinstance from the Add menu. - View the
Audittab of the instance.