-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow to validate some best practices #47
Comments
I have in my project technical groups (your fragments) and user groups (your roles). They placed in the different folders under Technical groups are not only fragments, because it is a bed naming for some technical groups. I have for example Basis Content Editor (base_ce), Basis User Administrator (base_ua). Both groups combine the access to AEM tools (AEM GUI & Backend servlets) and AEM content area (functional content root ex. /content/catalogs, /content/dam/common, ...)
It is not clear for me why you want to deny to use "isMemberOf" and "members" properties and deny the assigning of roles to tech groups during the execution of ACL Tool? I use it already to assign all my user groups (role) to other tech groups. |
@mtstv the driver here is that you don't want any group members in a group like myproject-content-editors - if you for example just reused the group myproject-content-editors in myproject-content-admins (using memberOf) to give all project admins the editor rights as well (without using a fragment), then user admins see myproject-content-admins in the list of members of myproject-content-editors when they try to assign users to myproject-content-editors (when this initially should be only an empty list). |
I think it depends on how you configurate the hierarchy of your group membership. If you don't want any groups in some other groups you can configurate group membership in other ways, for example to define a basis content admin group only for content admin groups and a basis content editor group only for content editor groups. But if some admin did a mistace, the execution of ACL Tool will delete wrong membership. Am I right? |
In my projects I separated the tech groups from user groups and also created a tenant structure with ACEs under /home/groups/usergroups/brand/market/site for each user admin group. |
In our projects, we use fragments that group the actual permissions on the content, the actual groups that user administrators for a tenant add users to (let's call them roles) are non-fragments and are just member of one or multiple fragments. This way the user admins never get to edit a role that already has members. It would be nice to validate that behaviour (if configured) automatically:
to distinguish what is a role and what a fragment, the algorithm could check
The first ist probably the better (easier to understand) approach
The text was updated successfully, but these errors were encountered: