ACLs and groups have always been quite challenging for me, but more or less I’ve always managed to solve them. ![]()
Now I’ve come across them again, for the first time with version 3.x.x, and I’ll provide a summarizing example of my cases along with some questions or requests for confirmation.
I may have always gotten everything wrong, but fortunately, it worked for me. ![]()
My sample situation is as follows.
Multicontext (multilingual) site with resources that only registered users can see on the front-end (private) and resources that only super admins can see in the manager (hidden), such as sitemap or clearcache.The private and the hidden are respectively inserted in the resource groups G.R.Private and G.R.Hidden
web
-
home
-
editor
-
private
-
hidden
ita
-
home_it
-
editor_it
-
private_it
-
hidden_it
The user groups are 4: the classic anonymous, super admin and the editor group, with their respective default policies with minor modifications, and finally, the one for registered users (front-end, G.R.Private).
Here are the permissions of the various groups to enforce what was initially written.
ANONIMOUS (NO Manager Access)
Context
web role: member 9999 policy: Load Only
ita role: member 9999 policy: Load Only
1- this is solely to make the unauthorized and error pages function correctly; if I don’t insert them, it would always go to the error page, right?
Resource Groups
G.R.Private role: member 9999 policy: Load Only context: web
G.R.Private role: member 9999 policy: Load Only context: ita
2- this for the same reason as point 1, or can I omit it too?
ADIMINISTRATOR (Super Admin)
Context
MGR role: 0-Super User policy: Administrator
web role: 0-Super User policy: Administrator
ita role: 0-Super User policy: Administrator
3- For contexts other than mgr, I could have simply put member9999 and Load List and View, as they only pertain to the front-end site display, right?
Resource Groups
G.R.Private role: 0-Super User policy: Resource context: web
G.R.Private role: 0-Super User policy: Resource context: ita
4- In this case, could I also have set the policy as Load, List, and View?
G.R.Hidden role: 0-Super User policy: Resource context: MGR
5- This setting makes the resources within G.R.Hidden visible only to this group in the manager, while in the front-end they are visible to everyone, correct?
REGISTERED USERS (NO Manager Access)
Context
web role: member 9999 policy: Load, List and View
ita role: member 9999 policy: Load, List and View
6- For front-end contexts for registered users, the Load, List, and View policy is sufficient, correct?
Resource Groups
G.R.Private role: member 9999 policy: Load, List and View context: web
G.R.Private role: member 9999 policy: Load, List and View context: ita
7- This allows registered users to see private resources on the front-end; I don’t need to set it as a resource policy?
EDITOR
Context
MGR role: 50-Editor policy: Content Editor
web role: member 9999 policy: Context
ita role: member 9999 policy: Context
8- For contexts other than mgr, I could have simply put fot policy Load List and View (and not Context), as they only pertain to the front-end site display, right?
Resource Groups
G.R.Private role: 50-Editor policy: Resource context: web
G.R.Private role: 50-Editor policy: Resource context: ita
9- In this case, could I also have set the policy as Load, List, and View?
10- This is more than enough to show private resources to editors logged into the manager. I don’t need to add them to the Registered Users group, right?
I admit that it will be quite tedious to respond to everything. ![]()
If it happens, I will provide a detailed summary post that could be useful to other users.