The Zope security model is administered using the same management interface for managing other object information. The activities involved in managing security include the following:
Adding users and setting their privileges with roles
Setting permissions on objects
Adding custom roles to users
Using acquisition to centralize common security settings
Configuring proxy information to make some objects have higher privilege