User Tools

Site Tools


access_control

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
access_control [2016/03/22 12:13] – [ACS Function Reference] g00r00access_control [2017/12/30 16:00] – [ACS Function Reference] g00r00
Line 7: Line 7:
 Each ACS function is nothing more than a single character, most often followed by a parameter afterwards that supplements the function.  The most basic example of this would probably be an ACS of "s20" An ACS of "s20" uses the function "S" which means security level, followed by 20, which defines is parameter.  The result of this ACS is that the user must have a security level of 20 or higher to have access. Each ACS function is nothing more than a single character, most often followed by a parameter afterwards that supplements the function.  The most basic example of this would probably be an ACS of "s20" An ACS of "s20" uses the function "S" which means security level, followed by 20, which defines is parameter.  The result of this ACS is that the user must have a security level of 20 or higher to have access.
  
-In addition to this basic function and parameter system, ACS can use parenthesis to force an order of evaluation, and also has the typical Boolean operators AND OR NOT that can be used along with them.  Let's look at one example of a more complex ACS before we move on:+In addition to this basic function and parameter system, ACS can use parenthesis to force an order of evaluation, and also offers the typical Boolean operators AND OR NOT.  Let's look at one example of a more complex ACS before we move on:
  
      (s20!s21|s255)|u10|(h22!h23)      (s20!s21|s255)|u10|(h22!h23)
Line 100: Line 100:
                  false.  This option is useful to restrict users from                  false.  This option is useful to restrict users from
                  downloading if they're not active message posters.                  downloading if they're not active message posters.
 +
 +          OS  -  This command is true when the user is connected via a
 +                 securely encrypted connection to the BBS, such as SSH.
  
           OV  -  This command returns True if the user has validated their           OV  -  This command returns True if the user has validated their
access_control.txt · Last modified: 2024/03/03 03:20 by avon

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki