Files Access Control
cloudShare’s File Access Control app enables administrators to create and manage a set of rule groups. Each of the rule groups consists of one or more rules. If all rules of a group hold true, the group matches the request and access is being denied. The rules criteria range from IP address, to user groups, collaborative tags and some more.
If access to a file has been denied for a user, the user can not:
- Create/upload the file
- Modify the files
- Delete the file
- Download the file
- Syncronise the file with clients, such as the Nextcloud desktop and mobile clients
The first rule group
Support only 9-5 denies any access to files for users of the Support user group, between 5pm and 9am.
The second rule group
Internal testing prevents users of the Internal testers group to access files from outside of the local network.
Denying access to folders
The easiest way to block access to a folder, is to use a collaborative tag. As mentioned in the Available rules section below, either the file itself or one of the parents needs to have the given tag assigned.
So you just need to assign the tag to the folder or file, and then block the tag with a rule group. The check is independent of the user’s permissions for the tag. Therefor restricted and invisible tags are recommended, otherwise a user could remove and reassign the tag.
This example blocks access to any folder with the tag
Prevent uploading of specific files
It’s possible to prevent specific files from being uploaded to cloudShare. You simply need to define a rule based on the mimetype and our powerful access control engine will block any attempt to upload the file. The safest way to define the rule is to use a regular expression, as it will help you cover all the known media types used for the type of file you’re trying to block.
The following example prevents zip files from being uploaded by using the regular expression:
Blocking user groups
When trying to deny access to a group of users, make sure that sharing does not allow them to create a way back in. When users are able to create a public link, the users can log themselves out and visit their own public link to access the files. Since at this point they are no user and therefor no member of the blocked group, they will be able to read and change the file.
The recommended work around is to create the same rule again, and deny access for all users that are
not memberof a group, that contains all users of your installation.
While access to files in external storages is not possible via cloudShare, users that have direct access to the external storage, can of course change files there directly. Therefor it is recommended to disable the
Allow users to mountexternal storage option, when trying to to completely lock out users.
All rules can also be inverted (from
is not) using the operator option.
- File collaborative tag: Either the file itself, or any of the file owner’s parent folders needs to be tagged with the tag.
- File mimetype: The mimetype of the file, e.g.
- File size: The size of the file (Only available on upload)
- Request remote address: An IP range (either v4 or v6) for the accessing user
- Request time: Time span and timezone when the request happens
- Request URL: The URL which requests the file. (This is the URL the file is served from, not the URL the user is currently looking at.)
- Request user agent: The user agent of the users browser or client. Nextcloud desktop, Android and iOS clients are available as preconfigured options.
- User group membership: Whether the user is a member of the given group.