Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
On this page:
| ||||||||
Line: 17 to 17 | ||||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
| ||||||||
Line: 51 to 51 | ||||||||
Managing Groups | ||||||||
Changed: | ||||||||
< < | Groups are defined by group topics located in the Main web, such as the TWikiAdminGroup. To create a new group, visit TWikiGroups and enter the name of the new group ending in Group into the "new group" form field. This will create a new group topic with two important settings: | |||||||
> > | The following describes the standard TWiki support for groups. Your local TWiki may have an alternate group mapping manager installed. Check with your TWiki administrator if you are in doubt.
Groups are defined by group topics located in the Main web. To create a new group, visit TWikiGroups and enter the name of the new group ending in Group into the "new group" form field. This will create a new group topic with two important settings: | |||||||
| ||||||||
Changed: | ||||||||
< < | The ALLOWTOPICCHANGE setting defines who is allowed to change the group topic; it is a comma delimited list of users and groups. You typically want to restrict that to the members of the group itself, so it should contain the name of the topic. This prevents users not in the group from editing the topic to give themselves or others access. For example, for the TWikiAdminGroup topic write:
| |||||||
> > | The ALLOWTOPICCHANGE setting defines who is allowed to change the group topic; it is a comma delimited list of users and groups. You typically want to restrict that to the members of the group itself, so it should contain the name of the topic. This prevents users not in the group from editing the topic to give themselves or others access. For example, for the KasabianGroup topic write:
| |||||||
![]() The Super Admin Group | ||||||||
Changed: | ||||||||
< < | By mistyping a user or group name in the settings, it's possible to lock a topic so that no-one can edit it from a browser. To avoid this, add the WikiNames of registered administrators to the super admin group topic called TWikiAdminGroup . The name of this topic is defined by the {SuperAdminGroup} configure setting. Example group setting: | |||||||
> > | A number of TWiki functions (for example, renaming webs) are only available to administrators. Administrators are simply users who belong to the SuperAdminGroup. This is a standard user group, the name of which is defined by {SuperAdminGroup} setting in configure. The default name of this group is the TWikiAdminGroup . The system administrator may have chosen a different name for this group if your local TWiki uses an alternate group mapping manager but for simplicity we will use the default name TWikiAdminGroup in the rest of this topic.
You can create new administrators simply by adding them to the TWikiAdminGroup topic. For example, | |||||||
| ||||||||
Added: | ||||||||
> > | A member of the Super Admin Group has unrestricted access throughout the TWiki, so only trusted staff should be added to this group. | |||||||
Restricting Access | ||||||||
Line: 75 to 80 | ||||||||
| ||||||||
Added: | ||||||||
> > |
| |||||||
Controlling access to a Web | ||||||||
Line: 88 to 96 | ||||||||
| ||||||||
Added: | ||||||||
> > |
| |||||||
Changed: | ||||||||
< < | Be careful with empty values for any of these. In older versions of TWiki,
| |||||||
> > | If your site allows hierarchical webs, then access to sub-webs is determined from the access controls of the parent web, plus the access controls in the sub-web. So, if the parent web has ALLOWWEBVIEW set, this will also apply to the subweb.
Creation and renaming of sub-webs is controlled by the WEBCHANGE setting on the parent web (or ROOTCHANGE for root webs). Renaming is additionally restricted by the setting of WEBRENAME in the web itself.
Note: For Web level access rights Setting any of these settings to an empty value has the same effect as not setting them at all. Please note that the documentation of TWiki 4.0 and earlier versions of TWiki 4.1 did not reflect the actual implementation, e.g. an empty ALLOWWEBVIEW does not prevent anyone from viewing the web, and an an empty DENYWEBVIEW does not allow all to view the web. | |||||||
Controlling access to a Topic | ||||||||
Line: 102 to 112 | ||||||||
| ||||||||
Added: | ||||||||
> > |
| |||||||
Remember when opening up access to specific topics within a restricted web that other topics in the web - for example, the WebLeftBar - may also be accessed when viewing the topics. The message you get when you are denied access should tell you what topic you were not permitted to access. | ||||||||
Changed: | ||||||||
< < | Be careful with empty values for any of these. In older versions of TWiki,
| |||||||
> > | Be careful with empty values for any of these.
![]() | |||||||
Controlling access to Attachments | ||||||||
Line: 130 to 148 | ||||||||
Note: Images embedded in topics will load much slower since each image will be delivered by the viewfile script. | ||||||||
Changed: | ||||||||
< < | Controlling who can create top-level webs | |||||||
> > |
Controlling who can manage top-level webs | |||||||
Top level webs are a special case, because they don't have a parent web with a WebPreferences. So there has to be a special control just for the root level.
| ||||||||
Line: 139 to 159 | ||||||||
How TWiki evaluates ALLOW/DENY settings | ||||||||
Changed: | ||||||||
< < | When deciding whether to grant access, TWiki evaluates the following rules in order (read from the top of the list; if the logic arrives at PERMITTED or DENIED that applies immediately and no more rules are applied). You need to read the rules bearing in mind that VIEW and CHANGE access may be granted/denied separately.
| |||||||
> > | When deciding whether to grant access, TWiki evaluates the following rules in order (read from the top of the list; if the logic arrives at PERMITTED or DENIED that applies immediately and no more rules are applied). You need to read the rules bearing in mind that VIEW, CHANGE and RENAME access may be granted/denied separately.
| |||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
| ||||||||
Deleted: | ||||||||
< < |
| |||||||
Access Control quick recipes |