AEM Development - Guidelines and Best Practices aem-development-guidelines-and-best-practices

Guidelines for Using Templates and Components guidelines-for-using-templates-and-components

Adobe Experience Manager (AEM) components and templates comprise a powerful toolkit. They can be used by developers to provide website business users, editors, and administrators with the functionality to adapt their websites to changing business needs (content agility). All this while retaining the uniform layout of the sites (brand protection).

A typical challenge for a person responsible for a website, or set of websites (for example, in a branch office of a global enterprise), is to introduce a new type of content presentation on their websites.

Let us assume there is a need to add a newslist page to the websites, which lists extracts from other articles already published. The page should have the same design and structure as the rest of the website.

The recommended way to approach such a challenge would be to:

  • Reuse an existing template so you can create a type of page. The template roughly defines page structure (navigation elements, panels, and so on), which is further fine-tuned by its design (CSS, graphics).
  • Use the paragraph system (parsys/iparsys) on the new pages.
  • Define access right to the Design mode of the paragraph systems, so that only authorized people (usually the administrator) can change them.
  • Define the components allowed in the given paragraph system so that editors can then place the required components on the page. In this case, it could be a list component, which can traverse a subtree of pages and extract the information according to predefined rules.
  • Editors add and configure the allowed components on the pages they are responsible for, to deliver the requested functionality (information) to the business.

This illustrates how this approach empowers the contributing users and administrators of the website to respond to business needs quickly, without requiring the involvement of development teams. Alternative methods, such as creating a template, are usually a costly exercise, requiring a change management process and involvement of the development team. This makes the whole process longer and costly.

The developers of AEM-based systems should therefore use:

  • templates and access control to paragraph system design for uniformity and brand protection
  • paragraph system including its configuration options for flexibility.

The following general rules for developers make sense in most usual projects:

  • Keep the number of templates low - as low as the number of fundamentally different page structures on the web sites.
  • Provide the necessary flexibility and configuration capabilities to your custom components.
  • Maximize use of the power and flexibility of the AEM paragraph system - the parsys & iparsys components.

Customizing Components and Other Elements customizing-components-and-other-elements

When creating your own components or customizing an existing component, it is often easiest (and safest) to reuse existing definitions. The same principles also apply to other elements within AEM, for example, the error handler.

This can be done by copying and overlaying the existing definition. In other words, copying the definition from /libs to /apps/<your-project>. This new definition, in /apps, can be updated according to your requirements.

See Using Overlays for more details.

For example:

  • Customizing a Component

    This involved overlaying a component definition:

    • Create a component folder in /apps/<website-name>/components/<MyComponent> by copying an existing component:

      • For example, to customize the Text component copy:

        • from /libs/foundation/components/text
        • to /apps/myProject/components/text
  • Customizing pages shown by the Error Handler

    This case involves overlaying a servlet:

    • In the repository, copy one or more default scripts:

      • from /libs/sling/servlet/errorhandler/
      • to /apps/sling/servlet/errorhandler/
Do not change anything in the /libs path.
The reason is because the content of /libs is overwritten the next time you upgrade your instance (and may well be overwritten when you apply either a hotfix or feature pack).
For configuration and other changes:
  1. copy the item in /libs to /apps
  2. make any changes within /apps

When to use JCR Queries and when not to use them when-to-use-jcr-queries-and-when-not-to-use-them

JCR Queries are a powerful tool when employed correctly. They are appropriate for:

  • real end-user queries, such as fulltext searches on content.

  • occasions where structured content must be found across the entire repository.

    In such cases, make sure that queries only run when required. For example, on component activation or cache invalidation (as opposed to, for example, Workflows Steps, Event Handlers that trigger on content modifications, and Filters).

Never use JCR Queries for pure rendering requests. For example, JCR Queries are not appropriate for the following:

  • rendering navigation
  • creating a “top 10 latest news items” overview
  • showing counts of content items

For rendering content, use navigational access to the content tree instead of performing a JCR Query.

If you use the Query Builder, you use JCR Queries, as the Query Builder generates JCR Queries under the hood.

Security Considerations security-considerations

It is also worthwhile to reference the security checklist.

JCR (Repository) Sessions jcr-repository-sessions

Use the user session, not the administrative session. This means you should use:


Protect against Cross-Site Scripting (XSS) protect-against-cross-site-scripting-xss

Cross-site scripting (XSS) allows attackers to inject code into web pages viewed by other users. This security vulnerability can be exploited by malicious web users to bypass access controls.

AEM applies the principle of filtering all user-supplied content upon output. Preventing XSS is given the highest priority during both development and testing.

Also, a web application firewall, such as mod_security for Apache, can provide reliable, central control over the security of the deployment environment and protect against previously undetected cross-site scripting attacks.

Example code provided with AEM may not itself protect against such attacks and generally relies on request filtering by a web application firewall.

The XSS API cheat sheet contains information that you must know to use the XSS API and make an AEM app more secure. You can download it here:

The XSSAPI cheat sheet.

Get File

Securing Communication for Confidential Information securing-communication-for-confidential-information

As for any internet application, make sure that when transporting confidential information

  • traffic is secured through SSL
  • HTTP POST is used if applicable

This applies to information that is confidential to the system (like configuration or administrative access) and information confidential to its users (like their personal details)

Distinct Development Tasks distinct-development-tasks

Customizing Error Pages customizing-error-pages

Error pages can be customized for AEM. This is advisable so that the instance does not reveal sling traces on internal server errors.

See Customizing Error Pages shown by the Error Handler for full details.

Open Files in the Java™ Process open-files-in-the-java-process

Because AEM can access many files, it is recommended that the number of open files for a Java™ process be explicitly configured for AEM.

To minimize this issue, development should ensure that any file opened is correctly closed when (meaningfully) possible.