Access Control"

This website contains links to software which is either no longer maintained or will be supported only until the end of 2019 (CKFinder 2). For the latest documentation about current CKSource projects, including software like CKEditor 4/CKEditor 5, CKFinder 3, Cloud Services, Letters, Accessibility Checker, please visit the new documentation website.

If you look for an information about very old versions of CKEditor, FCKeditor and CKFinder check also the CKEditor forum, which was closed in 2015. If not, please head to StackOverflow for support.

m (Reverted edits by Wiktor (Talk); changed back to last version by W.olchawa)
 
(4 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
__TOC__
 
__TOC__
  
Access control is a way you to give your users different permissions while working on folders and files. The default setting in the config.cfm file gives permission to every user and permits all the options. In order to change this configuration you must firstly know the basic of the '''config.accessControl''' function placed in the config.cfm file. 
+
Access control is a way you to give your users different permissions while working on folders and files. The default setting in the config.cfm file gives permission to every user and permits all the options. In order to change this configuration you must firstly know the basic of the '''config.accessControl''' structure placed in the config.cfm file. 
  
The syntax of the function:
+
=== The syntax of the ACL Items ===
 
<pre>config.accessControl[1] = structNew();
 
<pre>config.accessControl[1] = structNew();
 
config.accessControl[1].role = '*';
 
config.accessControl[1].role = '*';
 
config.accessControl[1].resourceType = '*';
 
config.accessControl[1].resourceType = '*';
 
config.accessControl[1].folder = '/';
 
config.accessControl[1].folder = '/';
 +
 
config.accessControl[1].folderView = true;
 
config.accessControl[1].folderView = true;
 
config.accessControl[1].folderCreate = true;
 
config.accessControl[1].folderCreate = true;
 
config.accessControl[1].folderRename = true;
 
config.accessControl[1].folderRename = true;
 
config.accessControl[1].folderDelete = true;
 
config.accessControl[1].folderDelete = true;
 +
 
config.accessControl[1].fileView = true;
 
config.accessControl[1].fileView = true;
 
config.accessControl[1].fileUpload = true;
 
config.accessControl[1].fileUpload = true;
 
config.accessControl[1].fileRename = true;
 
config.accessControl[1].fileRename = true;
 
config.accessControl[1].fileDelete = true;</pre>  
 
config.accessControl[1].fileDelete = true;</pre>  
The three most important parameters of the "'''Access Control'''" function are:
+
{{ckfinder_acl_explanation}}
  
=== role ===
+
==== Example 1 ====
  
The '''role'''is an attribute which sets the type of the user. It is set to "*" as default and you may treat as 'every user'. You may set this parameter to other name like: 'user' or 'limited_functions'. The name of the user type will be directly connected to the function the user may use.
+
If you want to restrict the upload, rename or delete of files in the "Logos" folder of the resource type "Images":
 +
<pre>
 +
config.accessControl[2] = structNew();
 +
config.accessControl[2].role = '*';
 +
config.accessControl[2].resourceType = 'Images';
 +
config.accessControl[2].folder = '/Logos';
  
=== resourceType ===
+
config.accessControl[2].folderView = true;
 +
config.accessControl[2].folderCreate = true;
 +
config.accessControl[2].folderRename = true;
 +
config.accessControl[2].folderDelete = true;
  
The '''resourceType''' defines the resources handled in CKFinder. A resource type is nothing more than a way to group files under different paths, each one having different configuration settings. E.g. Images, Flash, Files.It is set to '*' as default and means that all of the resources are available.
+
config.accessControl[2].fileView = true;
 
+
config.accessControl[2].fileUpload = false;
=== folder ===
+
config.accessControl[2].fileRename = false;
 
+
config.accessControl[2].fileDelete = false;
'''Folder''' determines where your limitations will be used. By placing the folders name you specify the place you want to put your restrictions in. It is set to '/' as default so no folder is set.
+
</pre>
 
+
The above example only refers to file operations in the folder '/Logos' itself. It doesn't restrict operations on the folder so the user can delete or rename the folder. In order to limit users ability to modify the folder (not its contents) you should change permissions in the parent folder.
=== folder and file options <br> ===
 
  
The rest of the variables are bool type and can be set as '''true''' or '''false'''. True of course enables an option, false disables it.<br>Example:<br>If you want to restrict the upload, rename or delete of files in the "Logos" folder of the resource type "Images":
+
==== Example 2 ====
<pre>config.accessControl[3] = structNew();
 
config.accessControl[3].role = '*';
 
config.accessControl[3].resourceType = 'Images';
 
config.accessControl[3].folder = '/Logos';
 
config.accessControl[3].fileUpload = false;
 
config.accessControl[3].fileRename = false;
 
config.accessControl[3].fileDelete = false;</pre>
 
The above example only refers to file operations in the folder '/Logos' itself. It doesn't restrict operations on the folder so the user can delete or rename the folder. In order to limit users ability to modify the folder (not its context) you should change permissions in the parent folder.<br>Example:
 
 
<pre>config.accessControl[3] = structNew();
 
<pre>config.accessControl[3] = structNew();
 
config.accessControl[3].role = '*';
 
config.accessControl[3].role = '*';
 
config.accessControl[3].resourceType = 'Images';
 
config.accessControl[3].resourceType = 'Images';
 
config.accessControl[3].folder = '/';
 
config.accessControl[3].folder = '/';
 +
 
config.accessControl[3].folderView = true;
 
config.accessControl[3].folderView = true;
 
config.accessControl[3].folderCreate = true;
 
config.accessControl[3].folderCreate = true;
 
config.accessControl[3].folderRename = false;
 
config.accessControl[3].folderRename = false;
config.accessControl[3].folderDelete = false;</pre>  
+
config.accessControl[3].folderDelete = false;
Now a user can view and create a folder, but he will be unable to rename or delete it. This is the best way to secure your folders from unauthorized access.
+
 
 +
config.accessControl[3].fileView = true;
 +
config.accessControl[3].fileUpload = true;
 +
config.accessControl[3].fileRename = true;
 +
config.accessControl[3].fileDelete = true;
 +
</pre>  
 +
Now a user can view and create a folder, but he will be unable to rename or delete it.&nbsp;<br>
  
=== sessions ===
+
=== Sessions ===
  
In order to enable the access control options for different users you should initialize a session.
+
The roleSessionVar is a session variable name that CKFinder must use to retrieve the "role" of the current user.
 
<pre>config.roleSessionVar = 'CKFinder_UserRole';
 
<pre>config.roleSessionVar = 'CKFinder_UserRole';
 
</pre>  
 
</pre>  
The session is a mechanism which will allow you to give different permissions to different users. <br>Example:<br>In your config.cfm file you create three different roles:
+
To switch between different user roles, simply change the session variable:<br>
 +
<pre>&lt;CFLOCK TIMEOUT="30" NAME="#session.sessionID#" TYPE="Exclusive"&gt;
 +
&lt;CFSET session.CKFinder_UserRole="#newrole#"&gt;
 +
&lt;/CFLOCK&gt;
 +
</pre>
 +
{{CKFinder Sessions|lang=ColdFusion}}
 +
==== Example3 ====
  
First role '''admin''' '''(*)''':
+
In your config.cfm file you create three different roles: First role, '''every user''' (wildcard "*" is used):
 
<pre>config.accessControl[1] = structNew();
 
<pre>config.accessControl[1] = structNew();
 
config.accessControl[1].role = '*';
 
config.accessControl[1].role = '*';
 
config.accessControl[1].resourceType = '*';
 
config.accessControl[1].resourceType = '*';
 
config.accessControl[1].folder = '/';
 
config.accessControl[1].folder = '/';
config.accessControl[1].folderView = false;
+
config.accessControl[1].folderView = true;
 
config.accessControl[1].folderCreate = false;
 
config.accessControl[1].folderCreate = false;
 
config.accessControl[1].folderRename = false;
 
config.accessControl[1].folderRename = false;
 
config.accessControl[1].folderDelete = false;
 
config.accessControl[1].folderDelete = false;
config.accessControl[1].fileView = false;
+
config.accessControl[1].fileView = true;
 
config.accessControl[1].fileUpload = false;
 
config.accessControl[1].fileUpload = false;
 
config.accessControl[1].fileRename = false;
 
config.accessControl[1].fileRename = false;
 
config.accessControl[1].fileDelete = false;</pre>  
 
config.accessControl[1].fileDelete = false;</pre>  
Second role '''user''':
+
Second role, '''registered''' user:
 
<pre>config.accessControl[2] = structNew();
 
<pre>config.accessControl[2] = structNew();
config.accessControl[2].role = 'user';
+
config.accessControl[2].role = 'registered';
 
config.accessControl[2].resourceType = '*';
 
config.accessControl[2].resourceType = '*';
 
config.accessControl[2].folder = '/';
 
config.accessControl[2].folder = '/';
Line 84: Line 98:
 
config.accessControl[2].fileRename = false;
 
config.accessControl[2].fileRename = false;
 
config.accessControl[2].fileDelete = false;</pre>  
 
config.accessControl[2].fileDelete = false;</pre>  
Third role '''guest''':
+
Third role, '''admin''':
 
<pre>config.accessControl[3] = structNew();
 
<pre>config.accessControl[3] = structNew();
config.accessControl[3].role = 'guest';
+
config.accessControl[3].role = 'admin';
 
config.accessControl[3].resourceType = '*';
 
config.accessControl[3].resourceType = '*';
 
config.accessControl[3].folder = '/';
 
config.accessControl[3].folder = '/';
config.accessControl[3].folderView = false;
+
config.accessControl[3].folderView = true;
config.accessControl[3].folderCreate = false;
+
config.accessControl[3].folderCreate = true;
config.accessControl[3].folderRename = false;
+
config.accessControl[3].folderRename = true;
config.accessControl[3].folderDelete = false;
+
config.accessControl[3].folderDelete = true;
config.accessControl[3].fileView = false;
+
config.accessControl[3].fileView = true;
config.accessControl[3].fileUpload = false;
+
config.accessControl[3].fileUpload = true;
config.accessControl[3].fileRename = false;
+
config.accessControl[3].fileRename = true;
config.accessControl[3].fileDelete = false;</pre>  
+
config.accessControl[3].fileDelete = true;</pre>  
You've created three different users permissions.
+
You've created three different users permissions. The default user (guest) is allowed to browse all files and folders. Registered user has also the ability to upload files and create folders. The administrator has full permissions.
  
'''Important:''' Note that when the role is set to '''*''' the user always has administrative privileges even though all the options are set to '''false'''.
+
Now let's say you have an authentication mechanism somewhere in your web application. In this file, you assign one of the pre-defined roles to the user:
 +
<pre>&lt;CFLOCK TIMEOUT="30" NAME="#session.sessionID#" TYPE="Exclusive"&gt;
 +
&lt;CFSET session.CKFinder_UserRole="#admin#"&gt;
 +
&lt;/CFLOCK&gt;
 +
</pre>
 +
if you want to use the admin role.
 +
<pre>&lt;CFLOCK TIMEOUT="30" NAME="#session.sessionID#" TYPE="Exclusive"&gt;
 +
&lt;CFSET session.CKFinder_UserRole="#registered#"&gt;
 +
&lt;/CFLOCK&gt;
 +
</pre>
 +
if you want to use the role assigned to registered users.
 +
<pre>&lt;CFLOCK TIMEOUT="30" NAME="#session.sessionID#" TYPE="Exclusive"&gt;
 +
&lt;CFSET session.CKFinder_UserRole="#guest#"&gt;
 +
&lt;/CFLOCK&gt;
 +
</pre>
 +
''guest'' doesn't have assigned any specific permissions, so the default values are used (defined with "*")
 +
<pre>&lt;CFLOCK TIMEOUT="30" NAME="#session.sessionID#" TYPE="Exclusive"&gt;
 +
&lt;CFSET session.CKFinder_UserRole="#any_other_value#"&gt;
 +
&lt;/CFLOCK&gt;
 +
</pre>
 +
same situation, default values are used.

Latest revision as of 07:46, 28 May 2010

Access control is a way you to give your users different permissions while working on folders and files. The default setting in the config.cfm file gives permission to every user and permits all the options. In order to change this configuration you must firstly know the basic of the config.accessControl structure placed in the config.cfm file. 

The syntax of the ACL Items

config.accessControl[1] = structNew();
config.accessControl[1].role = '*';
config.accessControl[1].resourceType = '*';
config.accessControl[1].folder = '/';

config.accessControl[1].folderView = true;
config.accessControl[1].folderCreate = true;
config.accessControl[1].folderRename = true;
config.accessControl[1].folderDelete = true;

config.accessControl[1].fileView = true;
config.accessControl[1].fileUpload = true;
config.accessControl[1].fileRename = true;
config.accessControl[1].fileDelete = true;

Access Control List entries are defined using the following values:

  • role – this attribute sets the type of the user. By default it is set to * which can be treated as "everybody". You may set this parameter to other name like user or limited_functions. The name of the user type will be directly related to the functions the user can make use of.
  • resourceType – this setting defines the resources handled in CKFinder. A resource type is nothing more than a way to group files under different paths, each having different configuration settings (like Images, Flash, Files). By default it is set to * which means that all resources are available.
  • folder – this setting determines where the restrictions will be used. By declaring a folder name you specify the place you want to put your restrictions on. By default it is set to /, so no folder is set.
  • folder* and file* options – these variables are of Boolean type and can be set to true or false. The true setting enables an option, false disables it.
  • It is possible to define numerous ACL entries. All attributes are optional. Subfolders inherit their default settings from their parents' definitions.

Example 1

If you want to restrict the upload, rename or delete of files in the "Logos" folder of the resource type "Images":

config.accessControl[2] = structNew();
config.accessControl[2].role = '*';
config.accessControl[2].resourceType = 'Images';
config.accessControl[2].folder = '/Logos';

config.accessControl[2].folderView = true;
config.accessControl[2].folderCreate = true;
config.accessControl[2].folderRename = true;
config.accessControl[2].folderDelete = true;

config.accessControl[2].fileView = true;
config.accessControl[2].fileUpload = false;
config.accessControl[2].fileRename = false;
config.accessControl[2].fileDelete = false;

The above example only refers to file operations in the folder '/Logos' itself. It doesn't restrict operations on the folder so the user can delete or rename the folder. In order to limit users ability to modify the folder (not its contents) you should change permissions in the parent folder.

Example 2

config.accessControl[3] = structNew();
config.accessControl[3].role = '*';
config.accessControl[3].resourceType = 'Images';
config.accessControl[3].folder = '/';

config.accessControl[3].folderView = true;
config.accessControl[3].folderCreate = true;
config.accessControl[3].folderRename = false;
config.accessControl[3].folderDelete = false;

config.accessControl[3].fileView = true;
config.accessControl[3].fileUpload = true;
config.accessControl[3].fileRename = true;
config.accessControl[3].fileDelete = true;

Now a user can view and create a folder, but he will be unable to rename or delete it. 

Sessions

The roleSessionVar is a session variable name that CKFinder must use to retrieve the "role" of the current user.

config.roleSessionVar = 'CKFinder_UserRole';

To switch between different user roles, simply change the session variable:

<CFLOCK TIMEOUT="30" NAME="#session.sessionID#" TYPE="Exclusive">
<CFSET session.CKFinder_UserRole="#newrole#">
</CFLOCK>

Please read the Sessions article for more information about using session variables.

Example3

In your config.cfm file you create three different roles: First role, every user (wildcard "*" is used):

config.accessControl[1] = structNew();
config.accessControl[1].role = '*';
config.accessControl[1].resourceType = '*';
config.accessControl[1].folder = '/';
config.accessControl[1].folderView = true;
config.accessControl[1].folderCreate = false;
config.accessControl[1].folderRename = false;
config.accessControl[1].folderDelete = false;
config.accessControl[1].fileView = true;
config.accessControl[1].fileUpload = false;
config.accessControl[1].fileRename = false;
config.accessControl[1].fileDelete = false;

Second role, registered user:

config.accessControl[2] = structNew();
config.accessControl[2].role = 'registered';
config.accessControl[2].resourceType = '*';
config.accessControl[2].folder = '/';
config.accessControl[2].folderView = true;
config.accessControl[2].folderCreate = true;
config.accessControl[2].folderRename = false;
config.accessControl[2].folderDelete = false;
config.accessControl[2].fileView = true;
config.accessControl[2].fileUpload = true;
config.accessControl[2].fileRename = false;
config.accessControl[2].fileDelete = false;

Third role, admin:

config.accessControl[3] = structNew();
config.accessControl[3].role = 'admin';
config.accessControl[3].resourceType = '*';
config.accessControl[3].folder = '/';
config.accessControl[3].folderView = true;
config.accessControl[3].folderCreate = true;
config.accessControl[3].folderRename = true;
config.accessControl[3].folderDelete = true;
config.accessControl[3].fileView = true;
config.accessControl[3].fileUpload = true;
config.accessControl[3].fileRename = true;
config.accessControl[3].fileDelete = true;

You've created three different users permissions. The default user (guest) is allowed to browse all files and folders. Registered user has also the ability to upload files and create folders. The administrator has full permissions.

Now let's say you have an authentication mechanism somewhere in your web application. In this file, you assign one of the pre-defined roles to the user:

<CFLOCK TIMEOUT="30" NAME="#session.sessionID#" TYPE="Exclusive">
<CFSET session.CKFinder_UserRole="#admin#">
</CFLOCK>

if you want to use the admin role.

<CFLOCK TIMEOUT="30" NAME="#session.sessionID#" TYPE="Exclusive">
<CFSET session.CKFinder_UserRole="#registered#">
</CFLOCK>

if you want to use the role assigned to registered users.

<CFLOCK TIMEOUT="30" NAME="#session.sessionID#" TYPE="Exclusive">
<CFSET session.CKFinder_UserRole="#guest#">
</CFLOCK>

guest doesn't have assigned any specific permissions, so the default values are used (defined with "*")

<CFLOCK TIMEOUT="30" NAME="#session.sessionID#" TYPE="Exclusive">
<CFSET session.CKFinder_UserRole="#any_other_value#">
</CFLOCK>

same situation, default values are used.

This page was last edited on 28 May 2010, at 07:46.