Usage
The basis of Macro Security is to prevent certain “restricted” macros from being deployed or edited within Confluence pages by unauthorized users, unless the edit restrictions defined for the page match the security restrictions defined for the macro OR the macro has been configured for and is being used in a space referenced by the Macro Security for Trusted Spaces approach for Macro Security.
- In some cases, you may opt to secure only specific macro parameters rather than the entire macro.
- Once a macro (or a macro parameter) has been configured for restricted use, you need to review any existing Confluence page that uses that the macro to ensure its page restrictions match that macro's newly configured security restrictions.
- For enabled macros that are marked as Use Restriction below, a security configuration entry is required for that the macro before that macro will work it works on any installation where Macro Security enabled. Visit our Macro Security User's Guide for more information.
Legend
Column | Description | Example Configuration |
---|---|---|
Use Restriction | means macro can only be used by authorized users |
|
Parameter Restriction | means that one or more parameters can be restricted in total or by value if the parameter indicates this specifically |
|
Controlled Parameters | List of those parameters that can be restricted or restricted by value |
Enabled Macros
Please note that both the parameter names and values are case-sensitive!
Table plus | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Examples
The Example Configurations page provides sample app configurations you can download and import to use as the starting point for your Macro Security configuration.
Configuration Tips
See Configuring and Enabling Macro Security for basic information and Understanding How Macro Security Works
Include Page | ||||
---|---|---|---|---|
|
See Key Concepts to learn about Macro Security in general and to review several example syntaxes. Include Page
Info | ||
---|---|---|
| ||
Macro security is not available on Cloud (OnDemand). Behavior of macros for Cloud is the same as if Macro Security was not installed. |