User Tools

Site Tools


access_control

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
access_control [2016/03/22 13:10]
g00r00
access_control [2017/12/30 17:00]
g00r00 [ACS Function Reference]
Line 7: Line 7:
 Each ACS function is nothing more than a single character, most often followed by a parameter afterwards that supplements the function.  The most basic example of this would probably be an ACS of "s20" An ACS of "s20" uses the function "S" which means security level, followed by 20, which defines is parameter.  The result of this ACS is that the user must have a security level of 20 or higher to have access. Each ACS function is nothing more than a single character, most often followed by a parameter afterwards that supplements the function.  The most basic example of this would probably be an ACS of "s20" An ACS of "s20" uses the function "S" which means security level, followed by 20, which defines is parameter.  The result of this ACS is that the user must have a security level of 20 or higher to have access.
  
-In addition to this basic function and parameter system, ACS can use parenthesis to force an order of evaluation, and also has the typical Boolean operators AND OR NOT that can be used along with them.  Let's look at one example of a more complex ACS before we move on:+In addition to this basic function and parameter system, ACS can use parenthesis to force an order of evaluation, and also offers the typical Boolean operators AND OR NOT.  Let's look at one example of a more complex ACS before we move on:
  
      (s20!s21|s255)|u10|(h22!h23)      (s20!s21|s255)|u10|(h22!h23)
Line 43: Line 43:
                  mode.  Where X is one of the following:                  mode.  Where X is one of the following:
  
-                      1 - User must have ANSI graphics +                    1 - User must have ANSI graphics 
-                      0 - User must have ASCII (none) graphics.+                    0 - User must have ASCII (none) graphics
 </code> </code>
           Fx  -  This command is used to check if a user has a certain flag           Fx  -  This command is used to check if a user has a certain flag
Line 62: Line 62:
                  after).  For example: H12 will prevent the user from                  after).  For example: H12 will prevent the user from
                  accessing this command before 12 noon on any given day.                  accessing this command before 12 noon on any given day.
-                 +
           Mx  -  This command is used to check if a user is access a           Mx  -  This command is used to check if a user is access a
                  command at a certain minute.  Where X is the minute in                  command at a certain minute.  Where X is the minute in
Line 85: Line 85:
                  called Boolean menu command.  For more information, see                  called Boolean menu command.  For more information, see
                  the menu commands: -P, -Y, and -N.                  the menu commands: -P, -Y, and -N.
-                 +
           OM  -  This command is used to check if the user has System           OM  -  This command is used to check if the user has System
                  Operator access to the current message base, or is                  Operator access to the current message base, or is
Line 91: Line 91:
                  in the Message bases (and therefore has Sysop-equivalent                  in the Message bases (and therefore has Sysop-equivalent
                  access to just that message)                  access to just that message)
-                 +
           ON  -  This command is True if the last message new scan had           ON  -  This command is True if the last message new scan had
                  new messages read by the user.                  new messages read by the user.
Line 100: Line 100:
                  false.  This option is useful to restrict users from                  false.  This option is useful to restrict users from
                  downloading if they're not active message posters.                  downloading if they're not active message posters.
-                 + 
 +          OS  -  This command is true when the user is connected via a 
 +                 securely encrypted connection to the BBS, such as SSH. 
           OV  -  This command returns True if the user has validated their           OV  -  This command returns True if the user has validated their
                  e-mail address                  e-mail address
-                 +
           OY  -  This command returns True if the last new message scan had           OY  -  This command returns True if the last new message scan had
                  new personal messages from the user.                  new personal messages from the user.
Line 123: Line 126:
                  permanent index is listed in the user editor, and no two                  permanent index is listed in the user editor, and no two
                  users will ever have the same permanent index number.                  users will ever have the same permanent index number.
-                 +
           Wx  -  This command is used to check the day of the week, where X           Wx  -  This command is used to check the day of the week, where X
                  is the day number (0 being Sunday and 6 being Saturday)                  is the day number (0 being Sunday and 6 being Saturday)
access_control.txt · Last modified: 2017/12/30 17:00 by g00r00