As with any security implementation, you should develop a plan for what needs to be controlled and who needs to have access. Access can be given to individual userids or groups. In many cases, confluence-administrators will likely be one such group to whom you will give access. Also, review Macro Security Managed Macros to understand what elements can be controlled.
Accessing the Add-on's Configuration page
From the Manage Add-ons admin page, expand the Macro Security for Confluence item and click Configure to access its configuration page.
Do not enable security from the add-on's configuration page.
Create and edit a macro-security.properties file that allows only the access you have planned.
Go to a convenient location in Confluence and add the file as an attachment. Using an attachment is convenient as it is automatically versioned by Confluence for future reference and change control.
The file can be named differently if needed.
See Example Configurations to review some sample configuration files you may wish to use as a starting point.
Provide the name of the properties file you added as an attachment to a Confluence page, using the syntax of space:page^filename and then click Load to load that properties file.
Select the Enable checkbox and then click Save to enable security.
Install one of the add-ons that you've configured to be restricted in the properties file.
Create a test page to verify that if the proper page restrictions are not added, then the page shows the appropriate error on display.
Repeat steps 6-7 for each add-on that needs to be installed.
Steps for Use Case #2
Care must be taken to avoid errors on pages that no longer conform to the security requirements.
Do not enable security from the add-on's configuration page.
Create and edit a macro-security.properties file that allows all access for the macros you use – in essence, not implementing any restrictions.
Go to a convenient location in Confluence and add the file as an attachment. Using an attachment is convenient as it is automatically versioned by Confluence for future reference and change control.
The file can be named differently if needed.
See Example Configurations to review some sample configuration files you may wish to use as a starting point.
Provide the name of the properties file you added as an attachment to a Confluence page, using the syntax of space:page^filename and then click Load to load that properties file.
Select the Enable checkbox and then click Save to enable security.
Apply "edit" page restrictions to those pages to only allow groups that are supposed to have access to the macro.
Edit the macro-security.properties file to restrict that specific macro, save your changes, and upload it to the Confluence page to which you previously attached it.
Re-load the properties file from the add-on's configuration page to make the configuration active.
Verify pages continue to work as before.
Create a test page to verify that if the proper page restrictions are not added, then the page shows the appropriate error on display.
Repeat steps 7-13 for each macro you want to restrict.
Set less specific values first, then more specific.
Use generics to set parameter values if necessary. Example: sql.datasource.* = confluence-administrators.
Use *ANY to not restrict a specific setting. Example: run = *ANY.
Set a value for every macro that can be controlled (for instance, a value of *ANY). Lack of a value normally means it is not authorized.
If a page containing a restricted macro will be viewed or updated by a user using remote REST APIs, including an account used for automation purposes, that Macro Security configuration must give that user authorization to use that restricted macro.
Communicating your configuration to users
It is a best practice to create a page for your Confluence user community that documents how you've configured Macro Security. This will guide them as to the "edit" page restrictions they must add to any page that will be using a restricted macro, and what spaces you've configured to use the Trusted Spaces approach for macro security.