-
Notifications
You must be signed in to change notification settings - Fork 17
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
docs(acl): Add Groups and ACL documentation
- Loading branch information
Showing
10 changed files
with
253 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
--- | ||
title: Mumble Server Administration | ||
--- |
Binary file added
BIN
+51.5 KB
hugo/content/documentation/administration/acl/acl-admin-allow-writeacl.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+43.3 KB
hugo/content/documentation/administration/acl/acl-in-example1-1all.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+43.3 KB
hugo/content/documentation/administration/acl/acl-in-example1-2in.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,250 @@ | ||
--- | ||
title: Mumble Permission Configuration - ACL | ||
date: 2023-03-12 | ||
--- | ||
For the configuration of permissions, Mumble uses ACL (Access Control Lists). A rule may apply to a user or group of users and may give or revoke permissions. | ||
|
||
While the Group and ACL dialogs might seem complex at first, for simple configuration much of their complexity can be ignored. | ||
The high configurability can be used for advanced and complex use cases. | ||
|
||
## Edit Dialog | ||
|
||
Groups, group members, and ACL rules are configured in the channel edit dialog. | ||
|
||
If you have the **"Write ACL" permission** you can open the channel edit dialog in the context menu *(right-click)*. | ||
|
||
![Screenshot of channel context menu with edit action](screenshot-channel-edit.jpg) | ||
|
||
*For initial setup, before you have given anyone permission, you will need to authenticate as the administrative SuperUser account. On first server startup the password is logged in `mumble-server.log` as `<W>2023-03-19 08:37:04.319 1 => Password for 'SuperUser' set to 'xxxxxx'`.* | ||
|
||
## Channels, Groups and ACL | ||
|
||
Groups and permissions are configured on channels. Channels inherit groups and rules by default. Groups can be used for grouping users into user roles. ACL rules are used to give or deny users or groups of users permissions on a channel. | ||
|
||
### User Groups | ||
|
||
In the *Groups* tab, you can see and edit the user groups of this channel. | ||
|
||
![Screenshot of channel groups dialog](screenshot-channel-groups.jpg) | ||
|
||
For a simple configuration, you will edit user groups on your servers root channel (the top-level, outer-most channel) and inherit these groups to all channels. | ||
|
||
![Screenshot of the root channel context menu with edit action](edit-root-channel.jpg) | ||
|
||
To describe the default permission setup we refer to the following example channel tree: | ||
|
||
```text | ||
Root | ||
ChannelA1 | ||
ChannelA11 | ||
ChannelA12 | ||
ChannelA13 | ||
ChannelB | ||
``` | ||
|
||
By default | ||
|
||
* the `Root` channel defines an `admin` group | ||
* the `admin` group is inheritable | ||
* the other channels inherit the `admin` group | ||
|
||
#### Advanced User Groups | ||
|
||
Because user groups can be defined in channels you can define separate user groups for different channel sub trees, individual channels, or influence who is a member of a group in the context of different channels. | ||
|
||
For example, to have different moderators users in separate channel trees, given the following channel setup | ||
|
||
```text | ||
Root | ||
ChannelA1 | ||
ChannelA11 | ||
ChannelA12 | ||
ChannelA13 | ||
ChannelB | ||
``` | ||
|
||
we can define a group `moderatorA` in `ChannelA1` and a group `moderatorB` in `ChannelB`. | ||
|
||
We may also define a group `userA` in `ChannelA1` and a group `userB` in `ChannelB` intending to only allow `userA` members to enter `ChannelA1` and its children, while only allowing `userB` members to enter the `ChannelB` channel. | ||
|
||
## ACL rules | ||
|
||
ACL rules are configured in the ACL tab of the channel edit dialog. | ||
|
||
![Screenshot of ACL dialog](screenshot-channel-acl.jpg) | ||
|
||
The Access Control *List* can have multiple rules. Rules may be inherited from parent channels - displayed in italics - or defined on this channel. | ||
|
||
Permission are evaluated from top to bottom. (*Allow* and *deny* may be overwritten further down.) | ||
|
||
### Selector | ||
|
||
A rule consists of a selector and permission actions. | ||
|
||
The **selector defines who the rule applies to** - a user, user group, or password group. It may use a prefix to indicate its type or modify its select-behavior. | ||
|
||
| Prefix | Prefix-Type | Description | Example | | ||
| ------ | ------------- | ------------------------------------------------ | ------------------------------ | | ||
| *none* | Id-Type | User | `User1`, `John Doe` | | ||
| `@` | Id-Type | Group | `@admin`, `@all`, `@moderator` | | ||
| `@#` | Id-Type | Channel password / Access Token | `@#secret`, `@#u8DhwG2` | | ||
| `~` | Eval-Locality | Evaluate in context of definition, not inherited | `@~sub 1,1`, `@~moderator` | | ||
| `!` | Inversion | Invert membership (not in group) | `!TrustedUser`, `!@moderator` | | ||
|
||
The tilde `~` eliminates any effect of inheritance or links. | ||
|
||
### Permission Allow/Deny | ||
|
||
The permission actions can allow or deny a permission. If the rule neither allows nor denies a permission it does not influence the top-to-bottom permission evaluation. | ||
|
||
### Rule Examples | ||
|
||
For example, given the following channel setup | ||
|
||
```text | ||
Root | ||
ChanA1 | ||
ChanA11 | ||
ChanA12 | ||
ChanA13 | ||
ChanB | ||
``` | ||
|
||
`@admin` defined on channel `Root` with *Allow* `Write ACL` will give members of the `admin` group full permissions. | ||
|
||
![Screenshot of giving admin group Write ACL permission](acl-admin-allow-writeacl.jpg) | ||
|
||
### Special Groups | ||
|
||
Some special groups can be used in ACL rules. The members of these groups are not defined explicitly. They are implicit - a consequence of the user state. | ||
|
||
| Group | Description | Notes | | ||
| -------- | ------------------- | -------------- | | ||
| `@all` | Applies to everyone | Useful for default permissions or for clearing complex rules to a well defined state. | | ||
| `@admin` | People with administrative authority | | | ||
| `@in` | In this channel | | | ||
| `@out` | Outside of this channel | | | ||
| `@sub` | Sub-channel - `@sub,a,b,c` | | | ||
|
||
#### `in` Group | ||
|
||
Given a channel tree | ||
|
||
```text | ||
Root | ||
ChanA1 | ||
ChanA11 | ||
ChanA12 | ||
ChanB | ||
``` | ||
|
||
To deny users outside of ChanA1 to send text messages to it, but allow users inside of it to send text messages, we add two rules. | ||
|
||
* *Deny* *Text message* to `@all` | ||
* *Allow* *Text message* to `@in` | ||
|
||
Now users in `Root`, `ChanA11`, `ChanA12`, ChanB can not send text messages to ChanA1. But users inside of ChanA1 can. | ||
|
||
![Screenshot of in rule example all rule](acl-in-example1-1all.jpg) | ||
|
||
![Screenshot of in rule example in rule](acl-in-example1-2in.jpg) | ||
|
||
The rule is inherited into `ChanA11` and `ChanA12`. But it applies as a rule within that channel. So users outside of `ChanA11` can not send text messages to `ChanA11`, but users inside of it can. Users outside of `ChanA12` can not send text messages to `ChanA12`, but users inside of it can. | ||
|
||
If we define the second rule [on `ChanA1`] as `@~in` instead of `@in` then the inherited rule in `ChanA11` and `ChanA12` is interpreted in the context of `ChanA1`. That means that a user in `ChanA1` will be able to send text messages to `ChanA1`, `ChanA11`, and `ChanA12`. But a user not in `ChanA1` can not. Users in `ChanA11` and `ChanA12` will also not be able to send text messages to `ChanA1`, `ChanA11`, and `ChanA12`. | ||
|
||
#### `sub` Group | ||
|
||
The `sub` group applies to subchannels and has three optional parameters `a,b,c`. It is written as `@sub` or `@sub,a` or `@sub,a,b` or `@sub,a,b,c` where `a`, `b`, and `c` are integer numbers. | ||
|
||
| Parameter | Description | Default | | ||
| --------- | -------------------------------- | ------- | | ||
| a | minimum number of common parents | `0` | | ||
| b | minimum path depth | `1` | | ||
| c | maximum path depth | | | ||
|
||
Given the channel tree | ||
|
||
```text | ||
ChanA | ||
ChanB | ||
ChanC | ||
``` | ||
|
||
| Selector | On channel | Applies to user in | | ||
| ------------ | ---------- | ------------------------- | | ||
| `@sub,0,0` | `ChanA` | `ChanA`, `ChanB`, `ChanC` | | ||
| `@sub,0,1` | `ChanA` | `ChanB`, `ChanC` | | ||
| `@sub,0,2` | `ChanA` | `ChanC` | | ||
| `@sub,0,0,0` | `ChanA` | `ChanA` | | ||
| `@sub,0,0,1` | `ChanA` | `ChanA`, `ChanB` | | ||
| `@sub,0,0,2` | `ChanA` | `ChanA`, `ChanB`, `ChanC` | | ||
| `@sub,0,1,1` | `ChanA` | `ChanB` | | ||
| `@sub,0,2,2` | `ChanA` | `ChanC` | | ||
|
||
In other words, `b` and `c` define the child depth span (children of `b`-th to `c`-th depth). | ||
|
||
##### `sub` Example 1 | ||
|
||
Given the channel tree | ||
|
||
```text | ||
ChanA | ||
ChanB | ||
ChanC | ||
``` | ||
|
||
A `@sub` rule (equivalent to `@sub,0,1`) on `ChanA` applies to users in `ChanB` and `ChanC` but gives permission on `ChanA`. | ||
|
||
For example, if *Text message* is *denied* on `ChanA`, but a `@sub` rule on `ChanA` allows *Text message*, a user in `ChanB` or `ChanC` can send text messages to `ChanA`. A user in `ChanA` can not send a text message to `ChanA`. | ||
|
||
For example, with two rules on `ChanA` | ||
|
||
* `ChanA`: `@all` *Deny* *Text message* | ||
* `ChanA`: `@sub` *Allow* *Text message* | ||
|
||
=> | ||
|
||
* `ChanA`: user can not send text message to `ChanA` | ||
* `ChanB`: user can send text message to `ChanA` | ||
* `ChanC`: user can sent text message to `ChanA` | ||
|
||
### Evaluation Locality | ||
|
||
Given the channel tree | ||
|
||
```text | ||
ChanA | ||
ChanB1 | ||
ChanB2 | ||
``` | ||
|
||
Defining an ACL rule `@in` on `ChanA` that inherits to subchannels means it *exists* in `ChanA` as well as its children `ChanB1` and `ChanB2`. | ||
But each rule applies to the channel *it is defined on*. | ||
|
||
Defining an ACL rule `@~in` on `ChanA` that inherits to subchannels means it applies to `ChanA` as well as its children `ChanB1` and `ChanB2`. | ||
But each rule applies to `ChanA` - where it is originally defined on. | ||
|
||
For example: | ||
|
||
If `ChanA` has `@all` *deny* *text message* and `@in` *allow* *text message* then | ||
|
||
* users in `ChanA` can only send text messages to `ChanA` | ||
* users in `ChanB1` can only send text messages to `ChanB1` | ||
* users in `ChanB2` can only send text messages to `ChanB2` | ||
|
||
If `ChanB` has `@all` *deny* *text message* and `@~in` *allow* *text message* then | ||
|
||
* users in `ChanA` can send text messages to `ChanA`, `ChanB1`, `ChanB2` | ||
* users in `ChanB1` or `ChanB2` can not send text messages | ||
|
||
## Linking Channels | ||
|
||
Linked channels share communication. Connecting channels and then restricting which users can do what in which channels is a versatile approach for configuring complex permission behavior. | ||
|
||
## Testing with multiple clients | ||
|
||
The Mumble client by default ensures only one instance is running [on a system], and loads user configuration with a user certificate. | ||
You can work around this with the `-m` and `-n` launch parameters (`mumble.exe -n -m`). | ||
|
||
This allows you to edit ACL with one client (normal launch, login as SuperUser or admin user), and test your ACL one or multiple unauthenticated clients. |
Binary file added
BIN
+51.7 KB
hugo/content/documentation/administration/acl/screenshot-channel-acl.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+14.7 KB
hugo/content/documentation/administration/acl/screenshot-channel-edit.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+31.8 KB
hugo/content/documentation/administration/acl/screenshot-channel-groups.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.