2007 | OriginalPaper | Chapter
Security
Published in: Web Component Development with Zope 3
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
This chapter gives you a look at Zope’s security architecture. Security is crucial to most web applications, especially when they are exposed to the Internet. This discussion has been postponed until now for two reasons. Firstly, we wanted to get started on the example application without having to worry too much about security initially. Secondly, understanding the security system requires an understanding of how Zope itself works. For example, understanding the concept of a trusted adapter requires an understanding of the fundamental concept of an adapter.