access_control
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
access_control [2016/03/22 11:50] – g00r00 | access_control [2016/03/22 12:41] – [Access Control Strings] g00r00 | ||
---|---|---|---|
Line 3: | Line 3: | ||
Access Control Strings (or ACS) are found all over Mystic BBS and are used to control the who, what, and when of security access to various parts of your BBS. Every menu, menu command, any many other functions in the BBS have an associated ACS definition which the SysOp can use to create and apply find-grained access control to all elements of the BBS. | Access Control Strings (or ACS) are found all over Mystic BBS and are used to control the who, what, and when of security access to various parts of your BBS. Every menu, menu command, any many other functions in the BBS have an associated ACS definition which the SysOp can use to create and apply find-grained access control to all elements of the BBS. | ||
- | The ACS system is designed to allow for the most intricate security controls without requiring programming, | + | The ACS system is designed to allow for the most intricate security controls without requiring programming, |
Each ACS function is nothing more than a single character, most often followed by a parameter afterwards that supplements the function. | Each ACS function is nothing more than a single character, most often followed by a parameter afterwards that supplements the function. | ||
- | In addition to this basic function and parameter system, ACS can use parenthesis to force an order of evaluation, and also has the typical Boolean operators AND OR NOT that can be used along with them. Let's look at one example of a more complex ACS before we move on: | + | In addition to this basic function and parameter system, ACS can use parenthesis to force an order of evaluation, and also offers |
| | ||
- | + | ||
The above ACS says that the user must have ANY one of the following things to have access: | The above ACS says that the user must have ANY one of the following things to have access: | ||
Line 27: | Line 27: | ||
</ | </ | ||
- | Now that we've had a little introduction to the ACS lets look at a reference of the ACS functions and their parameters: | + | For most System Operators just basic ACS functions |
+ | ===== ACS Function Reference ===== | ||
Ax - This command is used to check the user's age. Where X is | Ax - This command is used to check the user's age. Where X is | ||
the age the user must be in order to pass. | the age the user must be in order to pass. | ||
- | Dx | + | Dx - This command is used to check if a user has a certain flag |
| | ||
flag which the user must have in order to pass. For | flag which the user must have in order to pass. For | ||
| | ||
D in flag set 2 in order to pass. | D in flag set 2 in order to pass. | ||
+ | < | ||
Ex - This command is used to check the user's current graphics | Ex - This command is used to check the user's current graphics | ||
| | ||
- | | + | |
- | 0 - User must have ASCII (none) graphics. | + | 0 - User must have ASCII (none) graphics |
+ | </ | ||
Fx - This command is used to check if a user has a certain flag | Fx - This command is used to check if a user has a certain flag | ||
| | ||
Line 60: | Line 62: | ||
| | ||
| | ||
+ | |||
+ | Mx - This command is used to check if a user is access a | ||
+ | | ||
+ | the 00-59 range. | ||
+ | be quarter past the hour or later. | ||
Nx - This command is used to check if a user is online a | Nx - This command is used to check if a user is online a | ||
Line 67: | Line 74: | ||
OA - This command is used to check the status of the user's | OA - This command is used to check the status of the user's | ||
- | node message | + | node message |
| | ||
they are not available. | they are not available. | ||
Line 78: | Line 85: | ||
| | ||
the menu commands: -P, -Y, and -N. | the menu commands: -P, -Y, and -N. | ||
+ | |||
+ | OM - This command is used to check if the user has System | ||
+ | | ||
+ | the owner of the current message when reading messages | ||
+ | in the Message bases (and therefore has Sysop-equivalent | ||
+ | | ||
+ | |||
+ | ON - This command is True if the last message new scan had | ||
+ | new messages read by the user. | ||
OP - This command is used to check the status of the user's | OP - This command is used to check the status of the user's | ||
Line 84: | Line 100: | ||
| | ||
| | ||
+ | |||
+ | OV - This command returns True if the user has validated their | ||
+ | | ||
+ | |||
+ | OY - This command returns True if the last new message scan had | ||
+ | new personal messages from the user. | ||
Sx - This command is used to check if a user meets a certain | Sx - This command is used to check if a user meets a certain | ||
Line 101: | Line 123: | ||
| | ||
users will ever have the same permanent index number. | users will ever have the same permanent index number. | ||
+ | |||
+ | Wx - This command is used to check the day of the week, where X | ||
+ | is the day number (0 being Sunday and 6 being Saturday) | ||
Zx - This command is used to check if a user is in a certain | Zx - This command is used to check if a user is in a certain | ||
Line 108: | Line 133: | ||
| | ||
- | Any of the above commands can be used together to create an ACS string | + | ===== Examples ===== |
- | used by Mystic BBS. Below are some examples of how they can be used: | + | |
+ | Any of the above commands can be used together to create an ACS string used by Mystic BBS. Below are some examples of how they can be used: | ||
s255 - User must have security of 255 or higher. | s255 - User must have security of 255 or higher. | ||
Line 120: | Line 146: | ||
ACS string. | ACS string. | ||
- | For added flexibility, | + | For added flexibility, |
- | which can be used in ACS strings: | + | |
& = Logical AND | & = Logical AND | ||
Line 129: | Line 154: | ||
% = Always FALSE | % = Always FALSE | ||
- | In addition to the operators, Mystic BBS also allows parenthesis in ACS | + | In addition to the operators, Mystic BBS also allows parenthesis in ACS strings to allow evaluation of grouped ACS commands. |
- | strings to allow evaluation of grouped ACS commands. | + | |
- | using operators and grouping are: | + | |
^ | ^ | ||
Line 146: | Line 169: | ||
higher. | higher. | ||
- | As you can see, the access command system gives Mystic BBS an | ||
- | |
access_control.txt · Last modified: 2024/03/03 03:20 by avon