aboutsummaryrefslogtreecommitdiff
path: root/doc/forum/access_restrictions:_for_extranet
diff options
context:
space:
mode:
authorhttp://smcv.pseudorandom.co.uk/ <smcv@web>2012-04-15 16:53:44 -0400
committeradmin <admin@branchable.com>2012-04-15 16:53:44 -0400
commit34e21ee99f61dd40116d19a59a4d2d6e7220571d (patch)
treec44d04dd46ccbfe0ad235d61a5057d494be01a2f /doc/forum/access_restrictions:_for_extranet
parentc25d6863edfb343a4bdbba8ad6e3a4b560b21733 (diff)
downloadikiwiki-34e21ee99f61dd40116d19a59a4d2d6e7220571d.tar
ikiwiki-34e21ee99f61dd40116d19a59a4d2d6e7220571d.tar.gz
Added a comment
Diffstat (limited to 'doc/forum/access_restrictions:_for_extranet')
-rw-r--r--doc/forum/access_restrictions:_for_extranet/comment_1_a0666c3c15661fb0fff70f313cd0d47d._comment29
1 files changed, 29 insertions, 0 deletions
diff --git a/doc/forum/access_restrictions:_for_extranet/comment_1_a0666c3c15661fb0fff70f313cd0d47d._comment b/doc/forum/access_restrictions:_for_extranet/comment_1_a0666c3c15661fb0fff70f313cd0d47d._comment
new file mode 100644
index 000000000..767fb7c03
--- /dev/null
+++ b/doc/forum/access_restrictions:_for_extranet/comment_1_a0666c3c15661fb0fff70f313cd0d47d._comment
@@ -0,0 +1,29 @@
+[[!comment format=mdwn
+ username="http://smcv.pseudorandom.co.uk/"
+ nickname="smcv"
+ subject="comment 1"
+ date="2012-04-15T20:53:44Z"
+ content="""
+Read/view access and write/edit access are rather different.
+You can limit write access via wiki configuration, and even
+configure it over the web with [[plugins/websetup]].
+
+The only way to limit read access is to restrict access to the
+ entire wiki via `.htaccess` or other web server configuration,
+preferably combined with use of `https`.
+IkiWiki can't limit read access to pages on its own[*],
+because it's a wiki compiler: when a page is viewed, the web
+server serves the compiled HTML without IkiWiki being involved.
+
+The best way to integrate access control into IkiWiki would
+probably be to have a CGI user interface for `.htaccess` or
+equivalent - but you'd still have to be careful, because,
+for instance, if a user can edit public pages, then they
+can insert a `\[[!include]]` directive to make the content
+of a private page public. As a result, the safest way to
+use it is to keep public and private information in
+separate wikis.
+
+[\*] strictly speaking, it *could* via a new plugin, but
+that would defeat many of its advantages
+"""]]