Summary

In this chapter we learned about the Moodle permission system and the explained concepts on which it is built. We gave a detailed example of permission calculation and influence of context precedence on the final outcome. In the last part we described best practices for using and applying roles within Moodle. We also presented the capabilities that may expose the system to a security risk and recommended ways of using them.

In the next chapter we will focus on protection against robots and spam-bots.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.187.113