Learn how to manage access, protect content, and apply security settings to keep your data secure and under control. Security in EPC provides flexible, role-based control over who can access, edit, or manage content. Whether assigning permissions to individual users, groups, or specific objects, this page explains the key concepts and tools to help you keep your environment secure.

On this page:

Related guides:
For step-by-step instructions on managing security in EPC, see:

What Are the Security Levels?

Security consists of three components: Licenses, Authorizations, and Permissions.

Components Options
Licenses
  • System Admins
    Full access and control across the system
  • Environment Admin
    Full access and control in one environment
  • Access to Latest Database
    Full access to all object versions. Intended for editors, process analysts, etc.
  • Access to Published Database
    View-only access to published versions. Intended for end-users.
Authorizations
  • Publish
    Only users with Access to Latest Database can be granted or denied this authorization.
  • Merge
    Requires Delete permission. Only users with Access to Latest Database can be granted or denied this authorization.
  • Import
    Only Environment Admins can be granted or denied this authorization.
  • Export
    Only Environment Admins can be granted or denied this authorization.
  • Download
  • Print
    Requires Download authorization.
Permissions
  • Read Published
    View only the published version (no editing or drafts)
  • Read Latest
    View all versions (no editing or deleting)
  • Write
    View and edit all versions (no deleting)
  • Delete
    View, edit, delete, and manage object security

Who Can Manage Security?

Security management is available to Admins and certain users with access to the Latest database, depending on their permissions.

Role What They Can Manage
System Admin Security for environments and objects.
Environment Admin Security for objects within their environment.
Users with Access to Latest Database + Delete Permission Security for objects they can delete.

How Security Works in EPC

Users can define security for groups or users by assigning permissions directly on environments, sets, folders, and objects. These permissions can be applied independently or automatically propagated to child objects.

For example, you might grant a group Delete permission on a set, but only give them Read Latest permission on a sensitive folder within that set. This ensures the group cannot edit or delete that folder. Direct security allows fine-grained, independent control at every level.

If your security model is simpler, you can also apply permissions at the environment level, granting access to all objects in the environment.

Permission Scenarios

What Happens When…

Action Result
You have different permissions via group and user You get the highest permission. Example: group has Delete, user has Read → you get Delete.
You move an object It keeps its current permissions.
You create a new object It inherits permissions from its parent.
You merge an object It gets the permissions of the destination object.
You copy an object It inherits permissions from the new parent.

How Do I Grant a User…

License Permission Authorization
Publish access? Access to Latest DB Write or Delete Publish
Merge access? Access to Latest DB Delete Merge
Import access? Environment Admin Import
Export access? Environment Admin Export
Read-only access? Access to Published DB Read Published
Latest access? Access to Latest DB Read Latest
Write access? Access to Latest DB Write
Delete access? Access to Latest DB Delete

Understanding Download & Print Authorizations

The rules for Download and Print authorizations only apply when the DOCUMENT_CONTROL_COPIES system setting is enabled.

With this setting turned on, you can control whether users can download original files, access previews, or print documents based on their assigned permissions.

Office (.docx, .xlsx, etc.) & PDF Files
→ To print, users must also be allowed to download.
→ If a user is allowed to download but not print, the system provides a non-printable PDF preview.


Here’s a table to better show these rules:

Download Auth. Print Auth. Can download? Can print? File Preview
✅ Original file Unprintable PDF
✅ Unprintable PDF ❌  Unprintable PDF
Unprintable PDF
Unprintable PDF

Other Files (Images, ZIPs, etc.)
→ To print, users must also be allowed to download.
→ If a user is allowed to download but not print, they can still access and open the original file.


Here’s a table to better show these rules:

Download Auth. Print Auth. Can download? Can print? File Preview
✅ Original file Unprintable
✅ Original file ❌  Unprintable
Unprintable
Unprintable

Object Book Generation
→ If the user can download and print, the object book is generated as a Word document.
→ If the user can download but not print, it is generated as a non-printable PDF.
→ If the user cannot download, they cannot generate the object book at all.


Here’s a table to better show these rules:

Download Auth. Print Auth. Book Generation
✅ Generated as Word file
✅ Generated as an unprintable PDF

Need more help with this?
Visit the Support Portal

Thanks for your feedback.