Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In WebAC you can use the acl:agentClass property of an WebAC Authorizations Authorization to point to a resource that holds a list of usernames. This allows you to create and manage groups of users within Fedora, and to assign different permissions to different groups. This how-to will guide you through the process of creating a resource, creating an agentClass group, and limiting access to that resource through an ACL that references that agentClass group.

...

  1. Create these four files:

    Code Block
    languagetext
    titleacl.ttl
    @prefix webac: <http://fedora.info/definitions/v4/webac#>.
    @prefix ldp: <http://www.w3.org/ns/ldp#>.
    
    <> a webac:Acl .


    Code Block
    languagetext
    titlegroup.ttl
    @prefix ldp: <http://www.w3.org/ns/ldp#>.
    @prefix foaf: <http://xmlns.com/foaf/0.1/> .
    
    <> a foaf:Group;
        foaf:member "testuser".


    Code Block
    languagetext
    titlefoo.ttl
    @prefix ldp: <http://www.w3.org/ns/ldp#>.
    @prefix acl: <http://www.w3.org/ns/auth/acl#>.
    @prefix dc: <http://purl.org/dc/elements/1.1/>.
    
    <> a acl:accessControl </fcrepo/rest/acl>;
        dc:title "Hello, World!".


    Code Block
    languagetext
    titleauthz.ttl
    @prefix acl: <http://www.w3.org/ns/auth/acl#>.
    
    <> a acl:Authorization;
        acl:accessTo </fcrepo/rest/foo>;
        acl:agentClass </fcrepo/rest/group>;
        acl:mode acl:Read.


  2. Upload these resources into Fedora:

    Code Block
    languagetext
    $ curl -X PUT http://localhost:8080/fcrepo/rest/acl -u fedoraAdmin:secret3 \
        -H "Content-Type: text/turtle" --data-binary @acl.ttl
    $ curl -X PUT http://localhost:8080/fcrepo/rest/foo -u fedoraAdmin:secret3 \
        -H "Content-Type: text/turtle" --data-binary @foo.ttl
    $ curl -X PUT http://localhost:8080/fcrepo/rest/group -u fedoraAdmin:secret3 \
        -H "Content-Type: text/turtle" --data-binary @group.ttl
    $ curl -X PUT http://localhost:8080/fcrepo/rest/acl/authz -u fedoraAdmin:secret3 \
        -H "Content-Type: text/turtle" --data-binary @authz.ttl

    (Note: The order you upload these in is important, since foo references acl, and authz references foo and group)

  3. Test that testuser can read the foo resource, while adminuser cannot: 

    Code Block
    languagetext
    $ curl -i http://localhost:8080/fcrepo/rest/foo -u testuser:password1
    $ curl -i http://localhost:8080/fcrepo/rest/foo -u adminuser:password2

    The first request should respond with 200 OK, while the second should be 403 Forbidden.

    To allow adminuser to also read the foo resource, we can add adminuser to the members of the group.

  1. Create group.sparql with the following contents:

    Code Block
    languagetext
    titlegroup.sparql
    PREFIX foaf: <http://xmlns.com/foaf/0.1/>
    
    INSERT {
        <> foaf:member "adminuser" .
    }
    WHERE {}


  2. Run this command to update the group and add adminuser to it:

    Code Block
    languagetext
    $ curl -i -X PATCH http://localhost:8080/fcrepo/rest/group \
        -u fedoraAdmin:secret3 \
        -H "Content-Type: application/sparql-update" \
        --data-binary @group.sparql

    You should receive a 204 No Content response on success.

  1. Now you should be able to repeat the command from step 3 and successfully retrieve the foo resource as adminuser

    Code Block
    languagetext
    $ curl -i http://localhost:8080/fcrepo/rest/foo -u adminuser:password2

    This time, you should get a 200 OK response.

...