Key Concepts

Laserfiche security controls access to content stored in a Laserfiche repository, limits who can perform specific activities within a Laserfiche repository, and determines who can administer different aspects of a Laserfiche installation. Below is a list of the key concepts that govern Laserfiche security.

Authentication

Authentication is the process of presenting and verifying credentials before allowing that connection to create a repository session. Laserfiche verifies the identity of a user before granting that user access to the Laserfiche repository. This process requires that a user present credentials, which are then verified by the Laserfiche Server. There are three authentication methods supported by Laserfiche: Laserfiche password authentication which requires users to log in with a user name and password, Windows domain authentication which uses the credentials of the current Windows user, and LDAP directory authentication which requires users to log in with an LDAP user name and password.

Users and Groups

Laserfiche security is based on users and groups. The permissions assigned to users or groups form the basis of your security policy on objects (i.e., documents, fields, volumes, etc.). Therefore, the maintenance of Laserfiche accounts or Windows or LDAP Account users and groups is essential to Laserfiche security.You can either grant authorization directly to users or, as is recommended, you can grant authorization to groups. Members of those groups will then inherit the authorization granted to their groups.

Authorization

Authorization is the process of controlling what users can see, do, and modify in the repository. Security administrators can control which operations users are allowed to perform on securable objects. Documents and folders (collectively referred to as entries), templates, fields, and volumes are securable and hence subject to access control. In order for a user (either a Laserfiche user or a Windows or LDAP account user) to perform an action within a Laserfiche repository or to perform an administrative task on it, he or she must be authorized to do so.

System Managers

System Managers can perform Server-wide administrative tasks such as repository creation, but not administrative tasks within a repository. The system manager account also defines who can perform high-level administrative tasks, and you should carefully consider which users should be added as System Managers.

Windows file security

In addition to securing access to a document, you should also secure images, text, and electronic files using Windows file security. Using Windows security prevents users from bypassing Laserfiche security and accessing images, text, and electronic files directly from the file system.

Default Security

Default security on volumes, templates, and fields allows you to design security policies for new objects of these types, which will be set as soon as new volumes, templates, or fields are created. If it has been properly set up, default security reduces the configuration necessary for each new object. You can still customize security on individual volumes, templates, and fields after they have been created.

Effective Permissions

A user's effective permissions are the sum of the permissions that were granted to the user and to the groups to which he or she belongs. Additionally, Laserfiche security mechanisms are designed to overlap so that any attempted operation may require the appropriate rights in several security mechanisms.

Simplicity

Your security system may be more complex than it needs to be. A properly configured Laserfiche security system should be easy to maintain, based on groups and folders, with few exceptions.