User
User Management System
Introduction
The User Access Control System provides enterprise-grade user management and permission controls within the Hawiyat platform. This system ensures secure, granular access management across all platform features.
Administrative privileges are strictly limited to one user per instance to maintain security and accountability.
System Architecture
Core Components
-
Authentication Layer
- User identification
- Session management
- Security protocols
- Access tracking
-
Authorization Layer
- Permission management
- Role assignments
- Access controls
- Policy enforcement
-
Audit System
- Activity logging
- Access monitoring
- Change tracking
- Compliance reporting
Permission Framework
Global Permissions
The platform provides granular control over user capabilities:
-
Project Management
-
Create Projects:
- New project initialization
- Template selection
- Resource allocation
- Configuration setup
-
Delete Projects:
- Project termination
- Resource cleanup
- Backup management
- Archive options
-
-
Service Control
-
Create Services:
- Application deployment
- Database creation
- Service configuration
- Resource assignment
-
Delete Services:
- Service termination
- Data preservation
- Resource recovery
- Dependency management
-
-
System Access
-
Traefik Management:
- Configuration access
- Route management
- Certificate handling
- Rule modification
-
Docker Control:
- Container management
- Image control
- Network configuration
- Volume management
-
API/CLI Access:
- Authentication tokens
- Swagger documentation
- API rate limits
- Integration capabilities
-
Project-Level Permissions
Granular access control for specific projects and services:
-
Access Levels
- View only
- Contribute
- Manage
- Admin
-
Resource Permissions
- Database access
- Storage management
- Deployment control
- Configuration rights
Role Management
Available Roles
-
Administrator
- Full system access
- User management
- System configuration
- Security controls
-
Project Manager
- Project creation
- Team management
- Resource allocation
- Monitoring access
-
Developer
- Code deployment
- Service management
- Debug access
- Log viewing
-
Operator
- System monitoring
- Basic maintenance
- Status reporting
- Issue tracking
Security Best Practices
-
Access Control
- Regular permission audits
- Least privilege principle
- Role rotation
- Access reviews
-
Monitoring
- User activity tracking
- Permission changes
- Access attempts
- Security events
-
Compliance
- Audit logging
- Policy enforcement
- Regular reviews
- Documentation
Regularly review and update user permissions to maintain security and ensure appropriate access levels.
Troubleshooting
Common Issues
-
Access Problems
- Permission conflicts
- Role misconfigurations
- Token expiration
- Session issues
-
Resolution Steps
- Verify permissions
- Check role assignments
- Validate tokens
- Clear sessions
Contact your system administrator for permission-related issues that cannot be resolved through standard procedures.