Configure settings to allow editing of checked out files

The AEM Guides Web Editor allows you to create and update DITA topics. You can configure the Web Editor to allow editing of only those documents that have been checked out from the repository. This ensures that no other writer accidentally overwrites a topic that is opened for editing by another writer. Once a topic is opened for editing, an author can check-in the file at the time of closing the file.

Another important rule is to ensure that files that have been checked out are checked back into the system. This prevents users from accidentally closing the files without checking them back in.

Use the instructions given in Configuration overrides to create the configuration file. In the configuration file, provide the following (property) details to configure editing of checked out files:

PIDProperty KeyProperty Value
com.adobe.fmdita.xmleditor.config.XmlEditorConfigxmleditor.autocheckoutBoolean (true/false).
Default value: false

In addition, you can also configure to show a warning message whenever a checked out file is closed without saving or checking it back into the repository.

PIDProperty KeyProperty Value
com.adobe.fmdita.xmleditor.config.XmlEditorConfigxmleditor.checkinBoolean (true/false).
Default value: false
NOTE
Irrespective of whether you turn on or off this feature, the file Check Out and Check In options are always available in a topic preview.

Overwrite checked out file on upload

NOTE
This configuration is applicable only when you create files from the Assets UI and not when you upload files using the WebDAV tool.

To allow users to overwrite the file on upload that has been checked out by them or some other user, perform the following steps:

  1. Use the instructions given in Configuration overrides to create the configuration file.
  2. In the configuration file, provide the following (property) details to configure the Overwrite Checked out File on Upload option:
PIDProperty KeyProperty Value
com.adobe.fmdita.confi g.ConfigManageroverwrite.checkout.onuploadBoolean (true/false).
Default value: false
NOTE
By default, this option is turned OFF. With this option selected, users will be able to overwrite checked out files. If the option is not selected, then the file is prevented from being overwritten if it is checked out by them or some other user.

Prevent deletion of checked out files

Use the instructions given in Configuration overrides to create the configuration file. In the configuration file, provide the following (property) details to prevent users from accidentally deleting files that have been checked out:

PIDProperty KeyProperty Value
com.adobe.fmdita.xmleditor.config.XmlEditorConfigxmleditor.preventcheckedoutcontentdeletionBoolean (true/false).
Default value: true

Prevent deletion of referenced files

As an administrator, you can control who can delete files from the AEM repository. Specifically, if a file contain references or is referenced by some other file, then you can define who can delete such files.

Using this configuration, you can allow or disallow all users from deleting files, or allow only a specific user group to delete files. If file deletion is allowed, then the following process is followed:

  • If you are deleting a folder, which contains all referenced and referencing files, then all files are deleted. The process will first delete all files that do not contain any references, followed by the files that contain references or are referenced.

  • If you are deleting a folder, and any file within the folder is referenced by a file outside that folder, then you will be prompted to remove the reference before deleting the file.

Use the instructions given in Configuration overrides to create the configuration file. In the configuration file, provide the following (property) details to define who can delete a file that contains references or is referenced by other files:

PIDProperty KeyProperty Value
com.adobe.fmdita.config.ConfigManagerblock.unsafe.deletePossible values are:
- allow_unsafe_delete_for_all
- allow_unsafe_delete_for_delete_assets_group
- block_unsafe_delete_for_all
Default value: allow_unsafe_delete_for_delete_assets_group
The details of these constants is given below.

Depending on who you want to give access for deletion, specify one of the following constants:

  • allow_unsafe_delete_for_all: Give permission to all users to delete files. In this case, if the file(s) contain references or is referenced by other files, then also you can forcefully delete such file(s). Before deleting the file, you will be shown a prompt with the references, you can cancel the delete operation, remove the references, and then finally delete the file(s). Or, you can forcefully delete the file(s) without removing the references.

  • allow_unsafe_delete_for_delete_assets_group: An Administrator or a user belonging to the delete-assets group is allowed to delete files. If any other user tries to delete files with any references, then they will not be allowed to delete such files until all references are removed. The following screenshot appears when a user, who does not have permissions, tries to delete files.

  • block_unsafe_delete_for_all: Disallow all users (including Administrators) from deleting files until the references to and from the file(s) are removed.