Permissions Model
Members of the ‘Administrators’ user group bypass the below permission model completely. They have full access to all hosts and all functions.
A none-admin user has no effective rights on rport unless via at least one user group, permissions are granted. Currently, rport is subdivided into the following functions:
- tunnels
- scripts
- commands
- vault
- scheduler
- monitoring
- uploads
- auditlog
The permissions are stored on the group_details
table of
your API access database. They are managed through
the update user groups API endpoint.
In addition to one of the above function permissions client permissions are needed. In other words, the function permissions define only what a user can do, but not on which clients he/she can do it.
There is no option to revoke a permission. Once a user group has a permission, you cannot revoke it through a second user group.
A user that has at least one of the above function permission needs at least access to one client to effectively use rport.
You can grant access to a single client to one or many user groups. The allowed user groups are stored on the clients’
table inside the details
object. The so-called client ACLs are managed through
the client ACL API endpoint
You can grant access to a client group to one or many user groups. This makes managing access rights effective and flexible.
Client group access is managed through
the client groups API endpoint. The underlying data is stored on
the client_groups
database.
There is no option to revoke a permission. If permission is granted to client group A, you cannot deny access to client group B if it is a subset of A.