Changes between Initial Version and Version 1 of UserGuidelines/Admin/Permissions/Rules


Ignore:
Timestamp:
02/09/17 09:23:03 (8 years ago)
Author:
Dominic König
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • UserGuidelines/Admin/Permissions/Rules

    v1 v1  
     1= How Permission Rules Are Applied =
     2[[TOC]]
     3
     4== Restricted Controllers ==
     5
     6Controller rules are applied for modules which are set as {{{restricted=True}}} in config.py, e.g.:
     7{{{
     8  ("org", Storage(name_nice = T("Organizations"),
     9                  restricted = True,
     10                  module_type = 1
     11                  ),
     12   ),
     13}}}
     14
     15If a controller is restricted, a controller rule ''must'' exist for a role to allow it to access to the controller.
     16
     17The default/index and default/user controllers can not be restricted (otherwise users can not authenticate to gain permission in the first place).
     18
     19== Mixing Controller Rules and Table Rules ==
     20
     21A controller rule limits the actions a user role can perform in that controller - irrespective of the table accessed by that controller.
     22
     23A table rule limits the actions a user role can perform on that table - regardless through which controller the table is accessed.
     24
     25If, in any situation, both rules exist, the '''most restrictive''' rule applies. That means:
     26- if an action is not permitted in that controller, then it is not permitted for any table accessed by that controller - even if table rules would allow it
     27- if an action is not permitted for a table, then it is not permitted in any controller - even if controller rules would allow it
     28
     29This makes it possible to:
     30- control access levels for each table individually where a controller accesses multiple tables (e.g. component tabs, custom forms)
     31- grant permission for a certain action on a table, while confining it to a particular controller
     32
     33== Fallbacks ==
     34
     35When no controller rule exists for a role yet the module is restricted, access to that controller will be denied for that role.
     36
     37Controller rules can be function-specific (function!=None) or module-wide (function==None). If no function-specific rule exists, the module-wide rule applies.
     38
     39If for a table no table rule exists for any role, the table is treated as unrestricted and no table rule will be applied at all. Controller rules still apply in that situation, however.
     40
     41If a table rule exists for at least one role, then the table is restricted. If for a restricted table no table rule exists for the role in question, then the respective controller rule will be used as the table rule. If no such controller rule exists for that role either, then access to the table will be denied.
     42
     43== Multiple User Roles ==
     44
     45If a user is assigned multiple roles, and thus more than one rule exists for a situation, then the '''most permissive''' rule applies.
     46
     47That means, if one role grants the user a permission, that permission can not be denied by any other of the user's roles.
     48
     49== Realm rule ==
     50
     51Permissions granted by a role are limited to the records that belong to the realm the role has been assigned for - if the role is realm-restricted.
     52
     53The "A-roles" can never be realm-restricted:
     54- ANONYMOUS
     55- AUTHENTICATED
     56- ADMIN
     57
     58Other roles can be assigned without realm-restriction by setting pe_id=None for the auth_membership record.
     59
     60The realm rule does not apply for the permission to CREATE records.
     61
     62== uACL vs oACL ==
     63
     64The uACL (universal ACL) defines the permissions granted by the rule for any record.
     65
     66The oACL (owner-ACL) defines ''additional'' permissions for records owned by the user, either as individual user (owned_by_user) or as member of a role (owned_by_group).
     67
     68Since record ownership is only established after the record has been created, there can not be an oACL-only CREATE permission. Consequently, CREATE-permission is always universal (uACL).
     69
     70== Ownership vs. Realms ==
     71
     72Users can individually own records outside of any of their realms. For such personal ownership outside of the user's realms, the oACL applies.
     73
     74Users can not own by role records outside of the realm that the role has been assigned for. For records owned by role outside of the user's realms, the oACL does ''not'' apply.
     75
     76== Realm Hierarchy ==
     77
     78Realms of person entities which are OUs (organisation units) of another person entity, become part of the realm of that other "parent" person entity (policy 7 and above).
     79
     80That means that if a role is assigned for an entity, its permissions apply to the realm of that entity ''and equally'' to the realms of all its descendant OUs.
     81
     82The OU-relationship is controlled by pr_role/pr_affiliation, and normally set implicitly onaccept.
     83
     84== Default Realm ==
     85
     86The default realm is the combined realm of all entities of which the user's person record is an immediate descendant OU (=can be multiple).
     87
     88If the user's person record is not an OU of any other person entity, then the default realm is only that person record itself.
     89
     90A default realm entity can be any type of person entity - an organisation, a facility, a team etc. When the user's affiliation with that entity ends, the realm of that entity will no longer belong to the user's default realm. This allows for implicit control of permissions through user-managed relationships (e.g. staff records, team memberships).
     91