12 | | == Available Privileges == |
13 | | |
14 | | To enable all privileges for a user, use the `TRAC_ADMIN` permission. Having `TRAC_ADMIN` is like being `root` on a *NIX system, it will allow you perform any operation. |
15 | | |
16 | | Otherwise, individual privileges can be assigned to users for the various different functional areas of Trac (note that the privilege names are case-sensitive): |
17 | | |
18 | | === Repository Browser === |
| 13 | == Graphical Admin Tab |
| 14 | |
| 15 | To access this tab, a user must have one of the following permissions: `TRAC_ADMIN`, `PERMISSION_ADMIN`, `PERMISSION_GRANT`, `PERMISSION_REVOKE`. The permissions can be granted using the `trac-admin` command (more on `trac-admin` below): |
| 16 | {{{ |
| 17 | $ trac-admin /path/to/projenv permission add bob TRAC_ADMIN |
| 18 | }}} |
| 19 | |
| 20 | Then, the user `bob` will be able to see the Admin tab, and can then access the permissions menu. This menu will allow you to perform all the following actions, but from the browser without requiring root access to the server (just the correct permissions for your user account). '''Use at least one lowercase character in user names, as all-uppercase names are reserved for permissions.''' |
| 21 | |
| 22 | 1. [[Image(htdocs:../common/guide/admin.png)]] |
| 23 | 1. [[Image(htdocs:../common/guide/admin-permissions.png)]] |
| 24 | 1. [[Image(htdocs:../common/guide/admin-permissions-TICKET_ADMIN.png)]] |
| 25 | |
| 26 | An easy way to quickly secure a new Trac install is to run the above command on the anonymous user, install the [http://trac-hacks.org/wiki/AccountManagerPlugin AccountManagerPlugin], create a new admin account graphically and then remove the TRAC_ADMIN permission from the anonymous user. |
| 27 | |
| 28 | From the graphical admin tab, users with `PERMISSION_GRANT` will only be allowed to grant permissions that they possess, and users with `PERMISSION_REVOKE` will only be allowed to revoke permissions that they possess. For example, a user cannot grant `MILESTONE_ADMIN` unless they have `PERMISSION_GRANT` and `MILESTONE_ADMIN`, and they cannot revoke `MILESTONE_ADMIN` unless they have `PERMISSION_REVOKE` and `MILESTONE_ADMIN`. `PERMISSION_ADMIN` just grants the user both `PERMISSION_GRANT` and `PERMISSION_REVOKE`, and users with `TRAC_ADMIN` can grant or revoke any permission. |
| 29 | |
| 30 | == Available Privileges |
| 31 | |
| 32 | To enable all privileges for a user, use the `TRAC_ADMIN` permission. Having `TRAC_ADMIN` is like being `root` on a *NIX system: it will allow you to perform any operation. |
| 33 | |
| 34 | Otherwise, individual privileges can be assigned to users for the various different functional areas of Trac ('''note that the privilege names are case-sensitive'''): |
| 35 | |
| 36 | === Repository Browser |
30 | | || `TICKET_CHGPROP` || Modify [wiki:TracTickets ticket] properties (priority, assignment, keywords, etc.) except description field || |
31 | | || `TICKET_MODIFY` || Includes both `TICKET_APPEND` and `TICKET_CHGPROP`, and in addition allows resolving [wiki:TracTickets tickets] || |
32 | | || `TICKET_ADMIN` || All `TICKET_*` permissions, plus the deletion of ticket attachments and modification of the description field || |
33 | | |
34 | | === Roadmap === |
35 | | |
36 | | || `MILESTONE_VIEW` || View a milestone || |
| 48 | || `TICKET_CHGPROP` || Modify [wiki:TracTickets ticket] properties (priority, assignment, keywords, etc.) with the following exceptions: edit description field, add/remove other users from cc field when logged in, and set email to pref || |
| 49 | || `TICKET_MODIFY` || Includes both `TICKET_APPEND` and `TICKET_CHGPROP`, and in addition allows resolving [wiki:TracTickets tickets]. Tickets can be assigned to users through a [TracTickets#Assign-toasDrop-DownList drop-down list] when the list of possible owners has been restricted. || |
| 50 | || `TICKET_EDIT_CC` || Full modify cc field || |
| 51 | || `TICKET_EDIT_DESCRIPTION` || Modify description field || |
| 52 | || `TICKET_EDIT_COMMENT` || Modify another user's comments. Any user can modify their own comments by default. || |
| 53 | || `TICKET_BATCH_MODIFY` || [wiki:TracBatchModify Batch modify] tickets || |
| 54 | || `TICKET_ADMIN` || All `TICKET_*` permissions, deletion of ticket attachments and modification of the reporter field, which grants ability to create a ticket on behalf of another user (it will appear that another user created the ticket). It also allows managing ticket properties through the web administration module. || |
| 55 | |
| 56 | Attention: the "view tickets" button appears with the `REPORT_VIEW` permission. |
| 57 | |
| 58 | === Roadmap |
| 59 | |
| 60 | || `MILESTONE_VIEW` || View milestones and assign tickets to milestones. || |
83 | | == Permission Groups == |
| 120 | Or add all privileges: |
| 121 | {{{ |
| 122 | $ trac-admin /path/to/projenv permission add bob TRAC_ADMIN |
| 123 | }}} |
| 124 | |
| 125 | == Permission Groups |
| 126 | |
| 127 | There are two built-in groups, "authenticated" and "anonymous". |
| 128 | Any user who has not logged in is automatically in the "anonymous" group. |
| 129 | Any user who has logged in is also in the "authenticated" group. |
| 130 | The "authenticated" group inherits permissions from the "anonymous" group. |
| 131 | For example, if the "anonymous" group has permission WIKI_MODIFY, |
| 132 | it is not necessary to add the WIKI_MODIFY permission to the "authenticated" group as well. |
| 133 | |
| 134 | Custom groups may be defined that inherit permissions from the two built-in groups. |
94 | | Group membership can be checked by doing a {{{permission list}}} with no further arguments; the resulting output will include group memberships. Use lowercase for group names, as uppercase is reserved for permissions. |
95 | | |
96 | | == Removing Permissions == |
| 145 | Group membership can be checked by doing a {{{permission list}}} with no further arguments; the resulting output will include group memberships. '''Use at least one lowercase character in group names, as all-uppercase names are reserved for permissions'''. |
| 146 | |
| 147 | == Adding a New Group and Permissions |
| 148 | Permission groups can be created by assigning a user to a group you wish to create, then assign permissions to that group. |
| 149 | |
| 150 | The following will add ''bob'' to the new group called ''beta_testers'' and then will assign WIKI_ADMIN permissions to that group. (Thus, ''bob'' will inherit the WIKI_ADMIN permission) |
| 151 | {{{ |
| 152 | $ trac-admin /path/to/projenv permission add bob beta_testers |
| 153 | $ trac-admin /path/to/projenv permission add beta_testers WIKI_ADMIN |
| 154 | |
| 155 | }}} |
| 156 | |
| 157 | == Removing Permissions |
114 | | $ trac-admin /path/to/projenv permission remove * REPORT_ADMIN |
115 | | }}} |
116 | | |
117 | | == Default Permissions == |
118 | | |
119 | | Granting privileges to the special user ''anonymous'' can be used to control what an anonymous user can do before they have logged in. |
120 | | |
121 | | In the same way, privileges granted to the special user ''authenticated'' will apply to any authenticated (logged in) user. |
122 | | |
| 175 | $ trac-admin /path/to/projenv permission remove '*' REPORT_ADMIN |
| 176 | }}} |
| 177 | |
| 178 | == Default Permissions |
| 179 | |
| 180 | By default on a new Trac installation, the `anonymous` user will have ''view'' access to everything in Trac, but will not be able to create or modify anything. |
| 181 | On the other hand, the `authenticated` users will have the permissions to ''create and modify tickets and wiki pages''. |
| 182 | |
| 183 | '''anonymous''' |
| 184 | {{{ |
| 185 | BROWSER_VIEW |
| 186 | CHANGESET_VIEW |
| 187 | FILE_VIEW |
| 188 | LOG_VIEW |
| 189 | MILESTONE_VIEW |
| 190 | REPORT_SQL_VIEW |
| 191 | REPORT_VIEW |
| 192 | ROADMAP_VIEW |
| 193 | SEARCH_VIEW |
| 194 | TICKET_VIEW |
| 195 | TIMELINE_VIEW |
| 196 | WIKI_VIEW |
| 197 | }}} |
| 198 | |
| 199 | '''authenticated''' |
| 200 | {{{ |
| 201 | TICKET_CREATE |
| 202 | TICKET_MODIFY |
| 203 | WIKI_CREATE |
| 204 | WIKI_MODIFY |
| 205 | }}} |