User Tools

Site Tools


rootdir_security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
rootdir_security [2022/02/11 12:39]
yves [Access control lists]
rootdir_security [2022/08/06 19:32]
yves [Accessing secured content]
Line 7: Line 7:
       * Configure public/​secret key combinations for S3 resources       * Configure public/​secret key combinations for S3 resources
       * Configure account credentials to be used when accessing a UNC network resource path       * Configure account credentials to be used when accessing a UNC network resource path
-  * Prevent users from access mounted content through root directories that they are or are not allowed to do+  * Prevent ​[[user_management|users]] from access mounted content through root directories that they are or are not allowed to do
       * Define Access control lists       * Define Access control lists
  
Line 16: Line 16:
 Based on the type of data storage that a root directory'​s mounting point refers to, the configuration offers different options: Based on the type of data storage that a root directory'​s mounting point refers to, the configuration offers different options:
  
-=== Local hard disk entry points ​===+  * [[rootdir_local|Local hard disk entry points]] 
 +  * [[rootdir_network|Network storage and UNC paths]] 
 +  * [[rootdir_s3|S3 storage]] 
 +  * [[rootdir_azure|Azure storage]]
  
-If you want to expose a local folder on the server'​s hard disk as a root directory in PMA.core, the simplest way to do this is by giving the IIS user account access rights to the folder using the Windows Explorer:+=== S3 storage ===
  
-{{ :rootdir_local10.png?​direct&​400 ​|}}+PMA.core is one of the few vendors that [[https://www.prweb.com/​releases/​pathomation_announces_support_for_cloud_storage_and_file_transfer_protocol_ftp_servers/​prweb18296771.htm|supports cloud storage natively]]. ​
  
 +Let's say that you have an S3 bucket and put slides in it:
  
-=== Network storage (UNC paths) ===+{{ ::​rootdir_s3_10.png?​direct&​400 |}}
  
-Pathomation runs under certain application pool. This application pool is associated with a user identify, which may not have access ​to the network path that you try to access. Giving access for the application pool to access the network resource may be difficult for a variety of reasons.+To protect access, you should create ​dedicated entity that can only access that content.
  
-If you can't immediately access the network path with default (i.e. application pool) credentials,​ you can provide additional information.+{{ ::​rootdir_s3_20.png?​direct&​400 |}}
  
-In the case below we've created ​a dedicated ​pma_read user that is permitted to acces the shared \\MALTA1767\reference path:+You can then create ​pair of dedicated ​access / secret keys for the new entity:
  
-{{ :rootdir_network10.png?​direct&​400 |}}+{{ :rootdir_s3_30.png?​direct&​400 |}}
  
 +These keys are then used to configure the S3 mounting point at the PMA.core side:
  
-=== S3 storage ​===+{{ :​rootdir_s3_40.png?​direct&​400 |}} 
 + 
 +The mounting point only functions when the provided credentials are still active on the S3 storage ​side. If not, an error message ensues: 
 + 
 +{{ :​rootdir_s3_50.png?​direct&​400 |}} 
 + 
 +If all is well, you can now browse your slides directly from your S3 content. 
 + 
 +{{ :​rootdir_s3_60.png?​direct&​400 |}} 
 + 
 +As of version 3.1, PMA.core also supports IAM AWS Role policies.
  
 === Azure storage === === Azure storage ===
  
 +Microsoft Azure has its own protocol, and so we provide a separate mounting point type of it.
 +
 +Let's say that you have an Azure container defined and put some slides in it already:
 +
 +{{ :​rootdir_azure_10.png?​direct&​400 |}}
 +
 +You can convert these credentials in a connectionstring:​
 +
 +''​%%DefaultEndpointsProtocol=https;​AccountName=pathomation;​AccountKey=SUPERSECRET;​BlobEndpoint=https://​pathomation.blob.core.windows.net/;​QueueEndpoint=https://​pathomation.queue.core.windows.net/;​TableEndpoint=https://​pathomation.table.core.windows.net/;​FileEndpoint=https://​pathomation.file.core.windows.net/;​%%''​
 +
 +This text snippet is then pasted in the connection string field of the mounting point properties:
 +
 +{{ :​rootdir_azure_20.png?​direct&​400 |}}
 +
 +If all goes well, you can now serve your slides from your Azure storage repositories.
  
 ==== Public vs private ==== ==== Public vs private ====
  
-Public ​root directories ​can be accesses by anybody who is a registered user in the PMA.core user repository.+As you have more [[user_management|users]] and more root-directories, it becomes undesirable that everybody ​is allowed to see everything.
  
-Private ​root directories ​are only accessible by those who have been explicitly given access to be allowed to access the folder through the directory'​s [[acl|access control list]].+Therefore, ​root-directories ​can be marked "​public"​ or "​private":​
  
 +{{ :​rootdir_public_private_switch.png?​direct&​200 |}}
 +
 +Public root directories are marked "​public",​ it means every user has access to them. They can be accessed by anybody who is a registered user in [[user_management|the PMA.core user repository]].
 +
 +Private root directories are marked "​private",​ it means only select users can see the content. They are only accessible by those who have been explicitly given access to be allowed to access the folder through the directory'​s [[rootdir_security#​access_control_list|access control list]].
  
 ==== Access control lists ==== ==== Access control lists ====
Line 51: Line 86:
  
 {{ :​acl.png?​nolink&​400 |}} {{ :​acl.png?​nolink&​400 |}}
 +
 +An interactive overview grid is available via the Root directories management view:
 +
 +{{ :​rootdir_acl_20.png?​direct&​400 |}}
 +
 +As you get even more root-directories and more users, it is useful to get an overview of who has access to what. For that, you can request the ACL report from the root-directories view.
 +
 +{{ :​overview.png?​nolink&​400 |}}
 +
 +The resulting report looks like this:
 +
 +{{ :​overview2.png?​nolink&​400 |}}
 +
rootdir_security.txt · Last modified: 2022/08/06 19:41 by yves