First Steps for a Migrated Repository

The Laserfiche migration process will retain your original security settings as much as possible when migrating a repository from Laserfiche 6 or 7 to Laserfiche 11.  However, certain security features have changed or are new to Laserfiche 11 and should be reviewed after your migration process is complete, to ensure that security in your new repository will operate in accordance with your security policy.

Bypass Filter Expressions

Folder Filter Expressions are a dynamic way to configure security for a folder using an advanced syntax string. The related privilege, Bypass Filter Expressions, confers significant performance advantages to users who have it, so by default it is granted to the Everyone group. Since repositories migrated from Laserfiche 6 or 7 contain no filter expressions, this does not bypass existing security, and if you do not plan to use filter expressions, the privilege should be left in place. However, if you intend to use filter expressions, you should remove the privilege from the Everyone group, and grant it only to the users and groups who should be able to bypass your filter expressions.

Entry Ownership

Entry ownership allows a user specified as a document's owner the ability to manage his or her own documents without needing to involve an administrator. Entry ownership confers the ability to modify security on the entry in question. By default, entry ownership is granted to a document's creator. If you wish to change the default document owner, or if you want documents to be created with no default owner, you can change default document ownership. Migrated documents will begin with no document owner, though a document owner can be applied to them by a privileged user. See Entry Ownership for more information.

Default Security

You can configure default security for volumes, fields, and templates. Default security settings control the starting security for these objects, allowing you to quickly configure the way that volumes, fields, and templates will be configured when they are created. Security settings can still be modified once the object is created. See Default Volume Security and Default Template and Field Security for more information.