# Conflicts: # src/Umbraco.Tests.Integration/TestServerTest/TestAuthHandler.cs # src/Umbraco.Web.BackOffice/Controllers/AuthenticationController.cs # src/Umbraco.Web.BackOffice/Controllers/BackOfficeController.cs # src/Umbraco.Web.BackOffice/Controllers/ContentController.cs # src/Umbraco.Web.BackOffice/Controllers/ContentTypeController.cs # src/Umbraco.Web.BackOffice/Controllers/MediaTypeController.cs # src/Umbraco.Web.BackOffice/Controllers/UsersController.cs # src/Umbraco.Web.BackOffice/Filters/DenyLocalLoginAuthorizationAttribute.cs # src/Umbraco.Web.BackOffice/Filters/OverrideAuthorizationFilterProvider.cs # src/Umbraco.Web.Common/Filters/UmbracoBackOfficeAuthorizeAttribute.cs # src/Umbraco.Web.Common/Filters/UmbracoBackOfficeAuthorizeFilter.cs
430 lines
23 KiB
C#
430 lines
23 KiB
C#
using System;
|
|
using Microsoft.AspNetCore.Authorization;
|
|
using Microsoft.AspNetCore.Identity;
|
|
using Microsoft.AspNetCore.Mvc.Filters;
|
|
using Microsoft.Extensions.DependencyInjection;
|
|
using Microsoft.Extensions.DependencyInjection.Extensions;
|
|
using Umbraco.Core;
|
|
using Umbraco.Core.BackOffice;
|
|
using Umbraco.Core.Security;
|
|
using Umbraco.Core.Serialization;
|
|
using Umbraco.Infrastructure.BackOffice;
|
|
using Umbraco.Net;
|
|
using Umbraco.Web.Actions;
|
|
using Umbraco.Web.BackOffice.Authorization;
|
|
using Umbraco.Web.BackOffice.Filters;
|
|
using Umbraco.Web.BackOffice.Security;
|
|
using Umbraco.Web.Common.AspNetCore;
|
|
using Umbraco.Web.Common.Authorization;
|
|
using Umbraco.Web.Common.Security;
|
|
|
|
namespace Umbraco.Extensions
|
|
{
|
|
public static class BackOfficeServiceCollectionExtensions
|
|
{
|
|
|
|
/// <summary>
|
|
/// Adds the services required for using Umbraco back office Identity
|
|
/// </summary>
|
|
/// <param name="services"></param>
|
|
public static void AddUmbracoBackOfficeIdentity(this IServiceCollection services)
|
|
{
|
|
services.AddDataProtection();
|
|
|
|
services.BuildUmbracoBackOfficeIdentity()
|
|
.AddDefaultTokenProviders()
|
|
.AddUserStore<BackOfficeUserStore>()
|
|
.AddUserManager<IBackOfficeUserManager, BackOfficeUserManager>()
|
|
.AddSignInManager<IBackOfficeSignInManager, BackOfficeSignInManager>()
|
|
.AddClaimsPrincipalFactory<BackOfficeClaimsPrincipalFactory<BackOfficeIdentityUser>>();
|
|
|
|
// Configure the options specifically for the UmbracoBackOfficeIdentityOptions instance
|
|
services.ConfigureOptions<ConfigureBackOfficeIdentityOptions>();
|
|
services.ConfigureOptions<ConfigureBackOfficeSecurityStampValidatorOptions>();
|
|
}
|
|
|
|
private static BackOfficeIdentityBuilder BuildUmbracoBackOfficeIdentity(this IServiceCollection services)
|
|
{
|
|
// Borrowed from https://github.com/dotnet/aspnetcore/blob/master/src/Identity/Extensions.Core/src/IdentityServiceCollectionExtensions.cs#L33
|
|
// The reason we need our own is because the Identity system doesn't cater easily for multiple identity systems and particularly being
|
|
// able to configure IdentityOptions to a specific provider since there is no named options. So we have strongly typed options
|
|
// and strongly typed ILookupNormalizer and IdentityErrorDescriber since those are 'global' and we need to be unintrusive.
|
|
|
|
// TODO: Could move all of this to BackOfficeComposer?
|
|
|
|
// Services used by identity
|
|
services.TryAddScoped<IUserValidator<BackOfficeIdentityUser>, UserValidator<BackOfficeIdentityUser>>();
|
|
services.TryAddScoped<IPasswordValidator<BackOfficeIdentityUser>, PasswordValidator<BackOfficeIdentityUser>>();
|
|
services.TryAddScoped<IPasswordHasher<BackOfficeIdentityUser>>(
|
|
services => new BackOfficePasswordHasher(
|
|
new LegacyPasswordSecurity(),
|
|
services.GetRequiredService<IJsonSerializer>()));
|
|
services.TryAddScoped<IUserConfirmation<BackOfficeIdentityUser>, DefaultUserConfirmation<BackOfficeIdentityUser>>();
|
|
services.TryAddScoped<IUserClaimsPrincipalFactory<BackOfficeIdentityUser>, UserClaimsPrincipalFactory<BackOfficeIdentityUser>>();
|
|
|
|
// CUSTOM:
|
|
services.TryAddScoped<BackOfficeLookupNormalizer>();
|
|
services.TryAddScoped<BackOfficeIdentityErrorDescriber>();
|
|
services.TryAddScoped<IIpResolver, AspNetCoreIpResolver>();
|
|
services.TryAddSingleton<IBackOfficeExternalLoginProviders, BackOfficeExternalLoginProviders>();
|
|
services.TryAddSingleton<IBackOfficeTwoFactorOptions, NoopBackOfficeTwoFactorOptions>();
|
|
services.TryAddSingleton<BackOfficeUserManagerAuditer>();
|
|
|
|
/*
|
|
* IdentityBuilderExtensions.AddUserManager adds UserManager<BackOfficeIdentityUser> to service collection
|
|
* To validate the container the following registrations are required (dependencies of UserManager<T>)
|
|
* Perhaps we shouldn't be registering UserManager<T> at all and only registering/depending the UmbracoBackOffice prefixed types.
|
|
*/
|
|
services.TryAddScoped<ILookupNormalizer, BackOfficeLookupNormalizer>();
|
|
services.TryAddScoped<IdentityErrorDescriber, BackOfficeIdentityErrorDescriber>();
|
|
|
|
return new BackOfficeIdentityBuilder(services);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Add authorization handlers and policies
|
|
/// </summary>
|
|
/// <param name="services"></param>
|
|
public static void AddBackOfficeAuthorizationPolicies(this IServiceCollection services, string backOfficeAuthenticationScheme = Constants.Security.BackOfficeAuthenticationType)
|
|
{
|
|
// NOTE: Even though we are registering these handlers globally they will only actually execute their logic for
|
|
// any auth defining a matching requirement and scheme.
|
|
|
|
services.AddSingleton<IAuthorizationHandler, BackOfficeHandler>();
|
|
services.AddSingleton<IAuthorizationHandler, TreeHandler>();
|
|
services.AddSingleton<IAuthorizationHandler, SectionHandler>();
|
|
services.AddSingleton<IAuthorizationHandler, AdminUsersHandler>();
|
|
services.AddSingleton<IAuthorizationHandler, UserGroupHandler>();
|
|
services.AddSingleton<IAuthorizationHandler, ContentPermissionsQueryStringHandler>();
|
|
services.AddSingleton<IAuthorizationHandler, ContentPermissionsResourceHandler>();
|
|
services.AddSingleton<IAuthorizationHandler, ContentPermissionsPublishBranchHandler>();
|
|
services.AddSingleton<IAuthorizationHandler, MediaPermissionsResourceHandler>();
|
|
services.AddSingleton<IAuthorizationHandler, MediaPermissionsQueryStringHandler>();
|
|
services.AddSingleton<IAuthorizationHandler, DenyLocalLoginHandler>();
|
|
|
|
services.AddAuthorization(o => CreatePolicies(o, backOfficeAuthenticationScheme));
|
|
}
|
|
|
|
private static void CreatePolicies(AuthorizationOptions options, string backOfficeAuthenticationScheme)
|
|
{
|
|
options.AddPolicy(AuthorizationPolicies.MediaPermissionByResource, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new MediaPermissionsResourceRequirement());
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.MediaPermissionPathById, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new MediaPermissionsQueryStringRequirement("id"));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.ContentPermissionByResource, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new ContentPermissionsResourceRequirement());
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.ContentPermissionEmptyRecycleBin, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(Constants.System.RecycleBinContent, ActionDelete.ActionLetter));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.ContentPermissionAdministrationById, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(ActionRights.ActionLetter));
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(ActionRights.ActionLetter, "contentId"));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.ContentPermissionProtectById, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(ActionProtect.ActionLetter));
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(ActionProtect.ActionLetter, "contentId"));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.ContentPermissionRollbackById, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(ActionRollback.ActionLetter));
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(ActionRollback.ActionLetter, "contentId"));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.ContentPermissionPublishById, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(ActionPublish.ActionLetter));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.ContentPermissionBrowseById, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(ActionBrowse.ActionLetter));
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(ActionBrowse.ActionLetter, "contentId"));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.ContentPermissionDeleteById, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new ContentPermissionsQueryStringRequirement(ActionDelete.ActionLetter));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.BackOfficeAccess, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new BackOfficeRequirement());
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.BackOfficeAccessWithoutApproval, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new BackOfficeRequirement(false));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.AdminUserEditsRequireAdmin, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new AdminUsersRequirement());
|
|
policy.Requirements.Add(new AdminUsersRequirement("userIds"));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.UserBelongsToUserGroupInRequest, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new UserGroupRequirement());
|
|
policy.Requirements.Add(new UserGroupRequirement("userGroupIds"));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.DenyLocalLoginIfConfigured, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new DenyLocalLoginRequirement());
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessContent, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(Constants.Applications.Content));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessContentOrMedia, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(Constants.Applications.Content, Constants.Applications.Media));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessUsers, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(Constants.Applications.Users));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessForTinyMce, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(
|
|
Constants.Applications.Content, Constants.Applications.Media, Constants.Applications.Members));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessMedia, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(Constants.Applications.Media));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessMembers, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(Constants.Applications.Members));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessPackages, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(Constants.Applications.Packages));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessSettings, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(Constants.Applications.Settings));
|
|
});
|
|
|
|
//We will not allow the tree to render unless the user has access to any of the sections that the tree gets rendered
|
|
// this is not ideal but until we change permissions to be tree based (not section) there's not much else we can do here.
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessForContentTree, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(
|
|
Constants.Applications.Content, Constants.Applications.Media, Constants.Applications.Users,
|
|
Constants.Applications.Settings, Constants.Applications.Packages, Constants.Applications.Members));
|
|
});
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessForMediaTree, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(
|
|
Constants.Applications.Content, Constants.Applications.Media, Constants.Applications.Users,
|
|
Constants.Applications.Settings, Constants.Applications.Packages, Constants.Applications.Members));
|
|
});
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessForMemberTree, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(
|
|
Constants.Applications.Content, Constants.Applications.Media, Constants.Applications.Members));
|
|
});
|
|
|
|
// Permission is granted to this policy if the user has access to any of these sections: Content, media, settings, developer, members
|
|
options.AddPolicy(AuthorizationPolicies.SectionAccessForDataTypeReading, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new SectionRequirement(
|
|
Constants.Applications.Content, Constants.Applications.Media, Constants.Applications.Members,
|
|
Constants.Applications.Settings, Constants.Applications.Packages));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessDocuments, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.Content));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessUsers, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.Users));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessPartialViews, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.PartialViews));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessPartialViewMacros, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.PartialViewMacros));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessPackages, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.Packages));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessLogs, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.LogViewer));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessDataTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.DataTypes));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessTemplates, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.Templates));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessMemberTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.MemberTypes));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessRelationTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.RelationTypes));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessDocumentTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.DocumentTypes));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessMemberGroups, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.MemberGroups));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessMediaTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.MediaTypes));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessMacros, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.Macros));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessLanguages, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.Languages));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessDocumentTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.Dictionary));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessDictionary, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.Dictionary, Constants.Trees.Dictionary));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessDictionaryOrTemplates, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.Dictionary, Constants.Trees.Templates));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessDocumentsOrDocumentTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.DocumentTypes, Constants.Trees.Content));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessMediaOrMediaTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.MediaTypes, Constants.Trees.Media));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessMembersOrMemberTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.MemberTypes, Constants.Trees.Members));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessAnySchemaTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(Constants.Trees.DataTypes, Constants.Trees.DocumentTypes, Constants.Trees.MediaTypes, Constants.Trees.MemberTypes));
|
|
});
|
|
|
|
options.AddPolicy(AuthorizationPolicies.TreeAccessAnyContentOrTypes, policy =>
|
|
{
|
|
policy.AuthenticationSchemes.Add(backOfficeAuthenticationScheme);
|
|
policy.Requirements.Add(new TreeRequirement(
|
|
Constants.Trees.DocumentTypes, Constants.Trees.Content,
|
|
Constants.Trees.MediaTypes, Constants.Trees.Media,
|
|
Constants.Trees.MemberTypes, Constants.Trees.Members));
|
|
});
|
|
}
|
|
}
|
|
}
|