Line: 1 to 1 | ||||||||
---|---|---|---|---|---|---|---|---|
TWiki Access Control
| ||||||||
Line: 226 to 226 | ||||||||
If it returns true, TWiki goes ahead and create the web without checking access control variables. Please read AllowWebCreateByUserMappingManager for more details. | ||||||||
Added: | ||||||||
> > | Forbid certain users to do certain actions by configurationYou may have an unruly registered users (e.g. a crawler program) who don't follow the rules while you don't have control over such users. And the web application container in which TWiki is installed may be managed by somebody else and you don't have tight and quick control.
To cope with such situations, certain users can be forbidden certain scripts by setting $TWiki::cfg{ForbidUserAction} = ' AggresiveCrawler: edit, oops, search; ReadOnlyUser: !view, viewfile; TotallyForbidden: !nothing; ';In this example:
| |||||||
User masqueradingThere are cases where it's handy to access TWiki on behalf of somebody else retaining a trace of your real identity rather than completely becoming a different user. | ||||||||
Line: 378 to 405 | ||||||||
You can have custom user/group notations such as USER:userid and LDAPGROUP:group-name and use them for access control. For example:
| ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
In a large organization, TWiki may need to depend on user and group data provided by its infrastructure. Custom user/group notations are handy in such situations though it's not trivial to implement. |