Displaying items by tag: Administrators
This is the second part of my secure website which is translated from the Hebrew guide. The first part was more basic and targeted beginners. This part is more advanced, with details and explanations.
One of the most depressing things in the internet world is when you discover your website has been hacked. The uncertainty and mistrust can terrify administrators and worse - your customers. For that purpose we created this guide. It aims to provide simple rules for protecting your Joomla! websites.
How to set up a better user experience for your clients — while enhancing usability — by using ACL on the back end of Joomla
Give your clients a backend menu that is tailored for them. Here’s how.
Background: December 2009, New York City
When the newly-formed Production Leadership Team (PLT) met in New York City in December 2009, we faced a challenge. Although Joomla! version 1.5 was popular and successful, it had been released almost two years earlier. The code for version 1.6 contained many incomplete and untested features, and no one could say how soon version 1.6 might be ready for release. (It turned out to be a little over a year, in January 2011.)
Because of the rise (and continuous improvement) of Content Management Systems like Joomla!, companies are more capable than ever of maintaining their own websites. However, deciding whether or not to actually maintain your own website (or pay a web design company to do it for you) is a more complicated decision than most people would think.
Improve user experience by customizing login modules, menu items, and other content to provide a consistent, tailored experience for your users.
Now that you have a grasp on the terminology of ACL, let's implement a simple system where different users see different content on a website. To follow along with this example, you should be working with Joomla 1.7 or higher.
One of the most powerful new features in Joomla 1.6 and later versions is Access Control Lists (ACL). ACL stands for access control lists. It refers to who has permission to do what on the website, including read, create, edit, delete, or log in, among other permissions.