From 744d3fff7ae9e00a9eeb2408a7c5586deca1270f Mon Sep 17 00:00:00 2001 From: MikeMannix Date: Tue, 4 Sep 2001 04:07:40 +0000 Subject: none --- TWiki/TWikiAccessControl.mdwn | 73 ++++++++++++++++++++++++++++--------------- 1 file changed, 47 insertions(+), 26 deletions(-) diff --git a/TWiki/TWikiAccessControl.mdwn b/TWiki/TWikiAccessControl.mdwn index 88b1d931..3153a5b9 100644 --- a/TWiki/TWikiAccessControl.mdwn +++ b/TWiki/TWikiAccessControl.mdwn @@ -2,32 +2,48 @@ ## TWiki Access Control +_Restricting read and write access to topics and webs, by users and groups_ + +### Overview + %WIKITOOLNAME% allows you to define restrictions of who is allowed to view a %WIKITOOLNAME% web, make changes to topics or attach files. **IMPORTANT NOTE:** Think twice before restricting read or write access to a web or a topic, because an open system where everybody can contribute is the essence of the %TWIKIWEB%.WikiCulture. Experience shows that unrestricted write access works very well because: -* There is enough peer pressure to post only conform content. -* Content does not get lost because topics are under revision control. -* A topic revision can be undone by a member of the %MAINWEB%.TWikiAdminGroup in case needed. +* Peer influence is enough to ensure that only relevant content is posted. +* Peer editing - edit anything on a page - keeps topics focussed. +* All content is preserved under revision control. + * Edits can be undone by the %MAINWEB%.TWikiAdminGroup (the default administrators group; see Managing Groups). + * Editing and refactoring (condensing a long topic) is encouraged (there's a safety net). ### Users and Groups Access control is based on users and groups. -**_Users_** are defined by the user topics in the %MAINWEB% web, i.e. %MAINWEB%.TWikiGuest +#### Managing Users + +A user is created by with the TWikiRegistration form. The process generates a topic in the %MAINWEB% web in the new user's [[WikiName]]. The default visitor name is %MAINWEB%.TWikiGuest. -* Users can be authenticated using basic authentication or SSL. [Installation Notes](TWikiDocumentation#installation) has more. +* Users can be authenticated using Basic Authentication or SSL. [[TWikiDocumentation]] has more. -**_Groups_** are defined by group topics in the %MAINWEB% web, i.e. %MAINWEB%.TWikiAdminGroup + -* A group topic name must end in **...Group** +#### Managing Groups + +Groups are defined by group topics in the %MAINWEB% web, like the %MAINWEB%.TWikiAdminGroup. + +* A group topic name must end in **\_Group** * The group topic should define these two variables: - * Set GROUP = < list of users and groups > - * Set ALLOWTOPICCHANGE = < list of users and groups > -* GROUP defines the members of the group; it is a comma delimited list of users and other groups. Example:
    \* Set GROUP = %MAINWEB%.SomeUser, %MAINWEB%.OtherUser, %MAINWEB%.SomeOtherGroup + +> * * Set GROUP = < list of users and groups > +> * Set ALLOWTOPICCHANGE = < list of users and groups > + +* GROUP defines the members of the group; it is a comma delimited list of users and other groups. Example:
**    \* Set GROUP = %MAINWEB%.SomeUser, %MAINWEB%.OtherUser, %MAINWEB%.SomeOtherGroup** * ALLOWTOPICCHANGE defines who is allowed to change the group topic; it is a comma delimited list of users and groups. You typically want to restrict that to the members of the group itself, so it should contain the name of the topic, i.e.
    \* Set ALLOWTOPICCHANGE = %MAINWEB%.TWikiAdminGroup
for the TWikiAdminGroup topic. (This is to prevent users not in the group from editing the topic and gaining unauthorized membership to the group.) -### Write Access Restriction by Topic +### Restricting Write Access + +#### Deny Editing by Topic You can define restrictions of who is allowed to make changes to a topic or attach files to it. @@ -42,7 +58,7 @@ ALLOWTOPICCHANGE defines users or groups that **are** allowed to make changes to DENYTOPICCHANGE is evaluated before ALLOWTOPICCHANGE. Access is denied if the authenticated person is in the DENYTOPICCHANGE list, or not in the ALLOWTOPICCHANGE list. Access is granted in case DENYTOPICCHANGE and ALLOWTOPICCHANGE is not defined. -### Write Access Restriction by Web +#### Deny Editing by Web You can define restrictions of who is allowed to make changes to a %WIKITOOLNAME% web. This includes creating new topics, changing topics or attaching files. @@ -56,7 +72,9 @@ The same rules apply like the one for Access Control for Individual Topics; with * DENYTOPICCHANGE (in topic) overrides DENYWEBCHANGE (in %WEBPREFSTOPIC%) * ALLOWTOPICCHANGE (in topic) overrides ALLOWWEBCHANGE (in %WEBPREFSTOPIC%) -### Rename Access Restriction by Topic +### Restricting Rename Access + +#### Deny Renaming by Topic You can define restrictions of who is allowed to rename a topic. Note that users need this permission in addition to the CHANGE permission in order to rename a topic. They also need CHANGE access to change references in referring topics. @@ -71,7 +89,7 @@ ALLOWTOPICRENAME defines users or groups that **are** allowed to rename the topi DENYTOPICRENAME is evaluated before ALLOWTOPICRENAME. Access is denied if the authenticated person is in the DENYTOPICRENAME list, or not in the ALLOWTOPICRENAME list. Access is granted in case DENYTOPICRENAME and ALLOWTOPICRENAME is not defined. -### Rename Access Restriction by Web +#### Deny Renaming by Web You can define restrictions of who is allowed to do renames for a %WIKITOOLNAME% web. @@ -85,7 +103,7 @@ The same rules apply like the one for Access Control for Individual Topics; with * DENYTOPICRENAME (in topic) overrides DENYWEBRENAME (in %WEBPREFSTOPIC%) * ALLOWTOPICRENAME (in topic) overrides ALLOWWEBRENAME (in %WEBPREFSTOPIC%) -### Read Access Restriction by Web +### Restricting Read Access You can define restrictions of who is allowed to view a %WIKITOOLNAME% web. @@ -94,28 +112,31 @@ Define one or both of these variable in the %WEBPREFSTOPIC% topic: * Set DENYWEBVIEW = < list of users and groups > * Set ALLOWWEBVIEW = < list of users and groups > -### Read Restriction Known Issues +#### Known Issues * The view restriction is not suitable for very sensitive content since there is a way to circumvent the read access restriction. -* Read access restriction only works if the view script is authenticated, that means that users need to log on also just to read topics. [TWiki Installation](TWikiDocumentation#installation) has more on basic authentication based on the `.htaccess` file. +* Read access restriction only works if the view script is authenticated, that means that users need to log on also just to read topics. [[TWikiDocumentation]] has more on Basic Authentication based on the **.htaccess** file. + +##### Selective Unrestricted Web Access + * There is a workaround if you prefer to have unrestricted access to view topics located in normal webs, and to authenticate users only for webs where view restriction is enabled: - * Leave the `view` script non authenticated in the `.htaccess` file. - * Enable the `$doRememberRemoteUser` flag in `wikicfg.pm` as described in [TWiki Authentication](TWikiDocumentation#authentication). %WIKITOOLNAME% will now remember the IP address of an authenticated user. - * Copy the `view` script to `viewauth` (or better, create a symbolic link) - * Add `viewauth` to the list of authenticated scripts in the .htaccess file. + * Leave the **view** script non-authenticated in the `.htaccess` file. + * Enable the **$doRememberRemoteUser** flag in **lib/wikicfg.pm** as described in [[TWikiDocumentation]]. %WIKITOOLNAME% will now remember the IP address of an authenticated user. + * Copy the **view** script to **viewauth** (or better, create a symbolic link) + * Add **viewauth** to the list of authenticated scripts in the .htaccess file. * When a user accesses a web where you enabled view restriction, %WIKITOOLNAME% will redirect from the `view` script to the `viewauth` script once (this happens only if the user has never edited a topic). Doing so will ask for authentication. The `viewauth` script shows the requested topic if the user could log on and if the user is authorized to see that web. -* If you enable view restriction for a web, it is recommended to restrict search "all webs" from searching this web. Enable this restriction with the `NOSEARCHALL` variable in its [[WebPreferences]], like: +* If you enable view restriction for a web, it is recommended to restrict search "all webs" from searching this web. Enable this restriction with the **NOSEARCHALL** variable in its [[WebPreferences]], like: * Set NOSEARCHALL = on -* It is not recommended to restrict view access to individual topics since all content is searchable **_within_** a web. +* It is not recommended to restrict view access to individual topics since all content is searchable _within_ a web. ### The SuperAdminGroup -The above schema can lock completely a topic in case of a typing error of the ALLOWTOPICCHANGE setting (see [UnchangeableTopicBug](http://www.twiki.org/cgi-bin/view/Codev/UnchangeableTopicBug)). To avoid this: +The above schema can lock completely a topic in case of a typing error of the ALLOWTOPICCHANGE setting (see [[TWikiCodevUnchangeableTopicBug]] for more detail). To avoid this: -* set the `$superAdminGroup` variable in `TWiki.cfg` to the name of a group of users that are always allowed to edit/view topics. E.g.: +* Set the **$superAdminGroup** variable in **lib/TWiki.cfg** to the name of a group of users that are always allowed to edit/view topics. $superAdminGroup = "TWikiAdminGroup"; -* the default setting is not to have superusers +* The default setting is not to have superusers. -- [[PeterThoeny]] - 16 Mar 2001
-- [[AndreaSterbini]] - 11 Apr 2001
%STOPINCLUDE% **_Related topics:_** %WIKIPREFSTOPIC%, %WEBPREFSTOPIC% (in every web), %MAINWEB%.TWikiAdminGroup, %MAINWEB%.TWikiGroups -- cgit v1.2.3