This chapter describes the general steps to follow when using security in an application. Because of the flexibility of the MarkLogic Server security model, there are different ways to implement similar security policies. These steps are simple guidelines; the actual steps you take depends on the security policies you need to implement. The following sections are included:
Load your documents with the appropriate permissions. If needed, change the permissions of existing documents using the xdmp:document-add-permissions, xdmp:document-set-permissions, and xdmp:document-remove-permissions functions.
Assign access privileges to HTTP, WebDAV, ODBC, and XDBC servers as needed.