You are not logged in Log in Join
You are here: Home » Members » Tres Seaver's Site » Zope Security Audit

Log in



Folder icon Zope Security Audit

Zope's fine-grained security model is powerful, but hard to manage. This tool gives the system administrator an overview of the security status of the site, by searching for "exceptions" to the default / acquired behavior. In particular, it flags all objects which meet have any of these criteria:

  • Local role assigments;
  • Proxy roles;
  • Overridden permission mappings;
  • Executable ownership which differes from the ownership of the 'aq_parent';
  • Owner local roles which don't include the executable owner (leave out System Processes for unowned).

The product includes a screenshot showing a sample report.

 Title   Type   Size   Modified   Status 
 README Edit object Document 3 K 2005-10-24 published
 Screenshot Edit object Image 38 K 2001-03-11 published
 Zope Security Audit 0.2 Edit object Software Release   2005-08-30 published
 Zope Security Audit 0.3 Edit object Software Release   2001-06-04 published
 Zope Security Audit Script Released Edit object News Item 2 K 2001-03-11 published
 ZopeSecurityAudit-1.0 Edit object Software Release   2005-10-20 published