(Page 2 of 2)
2. Real-time governance
Keep information up to date and in sync between security and search. Do not let the search infrastructure's shared data go stale when making changes in the security policies. The data must stay relevant and fresh, or else it’s going to be wrong (user X can no longer read B; not sharing this change leaves user X finding B in search).
3. Context awareness
When a request comes in for information, take the context of that request into consideration when performing the search. If a user logs on and performs a search, the system "knows" the user and takes the person’s credentials into consideration when passing this information to the search infrastructure. The search infrastructure can then calculate the correct result (user X finds A, but not B; the administrator revokes user X's permissions on A, user X finds neither A or B).
When it comes to Enterprise CMS, a large part of increasing adoption comes from the trust users will put in the system, particularly when it comes to handling sensitive information. You want the system to earn users’ trusts while providing great usability. It takes a lot of work to find the right balance between search and security, but when you do, your organization will find its Enterprise CMS users to be a happier, more productive lot.
Title image courtesy of Anatoli Styf (Shutterstock)
Editor's Note: You may also be interested in reading this article:
About the Author
Raymond Augé is a Senior Software Architect focused on feature development and innovation. Since joining Liferay in 2005, his goal has been to increase ease of development without compromising creativity.