Hawiyat

User

User Management System

Introduction

The User Access Control System provides enterprise-grade user management and permission controls within the Hawiyat platform. This system ensures secure, granular access management across all platform features.

Administrative privileges are strictly limited to one user per instance to maintain security and accountability.

System Architecture

Core Components

  1. Authentication Layer

    • User identification
    • Session management
    • Security protocols
    • Access tracking
  2. Authorization Layer

    • Permission management
    • Role assignments
    • Access controls
    • Policy enforcement
  3. Audit System

    • Activity logging
    • Access monitoring
    • Change tracking
    • Compliance reporting

Permission Framework

Global Permissions

The platform provides granular control over user capabilities:

  1. Project Management

    • Create Projects:

      • New project initialization
      • Template selection
      • Resource allocation
      • Configuration setup
    • Delete Projects:

      • Project termination
      • Resource cleanup
      • Backup management
      • Archive options
  2. Service Control

    • Create Services:

      • Application deployment
      • Database creation
      • Service configuration
      • Resource assignment
    • Delete Services:

      • Service termination
      • Data preservation
      • Resource recovery
      • Dependency management
  3. System Access

    • Traefik Management:

      • Configuration access
      • Route management
      • Certificate handling
      • Rule modification
    • Docker Control:

      • Container management
      • Image control
      • Network configuration
      • Volume management
    • API/CLI Access:

      • Authentication tokens
      • Swagger documentation
      • API rate limits
      • Integration capabilities

Project-Level Permissions

Granular access control for specific projects and services:

  1. Access Levels

    • View only
    • Contribute
    • Manage
    • Admin
  2. Resource Permissions

    • Database access
    • Storage management
    • Deployment control
    • Configuration rights

Role Management

Available Roles

  1. Administrator

    • Full system access
    • User management
    • System configuration
    • Security controls
  2. Project Manager

    • Project creation
    • Team management
    • Resource allocation
    • Monitoring access
  3. Developer

    • Code deployment
    • Service management
    • Debug access
    • Log viewing
  4. Operator

    • System monitoring
    • Basic maintenance
    • Status reporting
    • Issue tracking

Security Best Practices

  1. Access Control

    • Regular permission audits
    • Least privilege principle
    • Role rotation
    • Access reviews
  2. Monitoring

    • User activity tracking
    • Permission changes
    • Access attempts
    • Security events
  3. Compliance

    • Audit logging
    • Policy enforcement
    • Regular reviews
    • Documentation

Regularly review and update user permissions to maintain security and ensure appropriate access levels.

Troubleshooting

Common Issues

  1. Access Problems

    • Permission conflicts
    • Role misconfigurations
    • Token expiration
    • Session issues
  2. Resolution Steps

    • Verify permissions
    • Check role assignments
    • Validate tokens
    • Clear sessions

Contact your system administrator for permission-related issues that cannot be resolved through standard procedures.

On this page