You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: source/hub/user-group-management.rst
-33Lines changed: 0 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,36 +40,3 @@ A good step-by-step guide for connecting Microsoft Entra with OpenID Connect can
40
40
41
41
.. warning::
42
42
Regardless of your choice, your Keycloak instance always contains two local users: ``admin`` and ``syncer``. **Do not edit or delete them!** The first one is for administration tasks and the second one is used to synchronize users and groups between Keycloak and Hub.
43
-
44
-
45
-
.. _hub/user-group-management/roles:
46
-
47
-
Roles
48
-
-------------
49
-
50
-
There are four different roles in Cryptomator Hub:
51
-
52
-
* **user**: A user can open vaults and manage their own account.
53
-
* **admin**: An admin manages the Keycloak realm, can see the audit log, and can create vaults.
54
-
* **create-vault**: Only users with this role can create vaults. The role is inherited by the `admin` role.
55
-
56
-
The ``user``, ``admin``, and ``create-vault`` roles are assigned to users or groups via the Keycloak admin console by an existing user with the ``admin`` role.
57
-
58
-
.. _hub/user-group-management/roles/create-vault:
59
-
60
-
Create Vault Role
61
-
^^^^^^^^^^^^^^^^^
62
-
63
-
By default, this role is only assigned to the ``admin`` role. This means that only users with the ``admin`` role can create vaults. If you want to allow other users to create vaults, you can assign the ``create-vault`` role to them directly or via a group.
64
-
65
-
If you want that all users can create vaults, assigning the ``create-vault`` role as transient role to the ``user`` role. This way, every user will have the ``create-vault`` role as well.
66
-
67
-
To allow all users vault creation, assign ``create-vault`` as a transient role to the ``user`` role:
Copy file name to clipboardExpand all lines: source/hub/vault-management.rst
+1-44Lines changed: 1 addition & 44 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,9 +34,6 @@ Alternatively, you can also access the list by clicking on the ``Vaults`` tab in
34
34
Create a Vault
35
35
--------------
36
36
37
-
.. note::
38
-
Creating vaults require the ``create-vault`` role. :ref:`Here <hub/user-group-management/roles>` you can read more about roles.
39
-
40
37
To create a vault in Hub, navigate to the vault list and click on the ``Create Vault`` button in the top right corner.
41
38
Every vault has a name and optionally a description.
42
39
Fill out the form and continue the process by clicking the ``Next`` button in the right corner.
@@ -168,46 +165,6 @@ To archive the vault, click on the ``Archive Vault`` button in the :ref:`vault d
168
165
169
166
You can unarchive it by clicking on the ``Owned by me`` tab in the navigation bar, select the vault and clicking on the ``Reactive Vault`` button.
170
167
171
-
.. _hub/vault-management/wot:
172
-
173
-
Web of Trust
174
-
^^^^^^^^^^^^
175
-
176
-
Cryptomator Hub uses a Web of Trust (WoT) to verify the identity of users during vault sharing.
177
-
178
-
The WoT state of a user is displayed in the vault details page. The state can be one of the following:
179
-
180
-
* **Unverified**: There is no turst chain between you and the specific user. Indicated with a red shield. You can change this by verifying the user.
181
-
* **Verified**: There is a trust chain between you and the specific user. Indicated with a green shield. You or a user you trust has verified the user.
182
-
183
-
To verify ``alice``, click on the red shield icon and select ``Check Idenditiy...``
184
-
185
-
.. image:: ../img/hub/wot-carol-unverified.png
186
-
:alt:Carol is unverified regarding its Web of Trust state
187
-
:width:920px
188
-
189
-
While verifiying a user, you need to enter the first characters of the user's public key fingerprint. This fingerprint is displayed in user coresponding user profile page.
190
-
191
-
.. image:: ../img/hub/wot-carol-verify.png
192
-
:alt:Verify Alice regarding its Web of Trust state
193
-
:width:920px
194
-
195
-
``alice`` is now verified
196
-
197
-
.. image:: ../img/hub/wot-carol-verified.png
198
-
:alt:Alice is verified regarding its Web of Trust state
199
-
:width:920px
200
-
201
-
The verification process is logged in the audit log with event type ``Signed Identity``
202
-
203
-
.. image:: ../img/hub/wot-audit-log.png
204
-
:alt:WAudit log
205
-
:width:920px
206
-
207
-
``signature still valid`` means that the ``identiy`` has still the same key. If the user account gets reset after verification, this message changes to ``was valid; signed key changed by now`` and the user needs to get verified again.
208
-
209
-
You can read more details about Web of Trust in the :ref:`Security section of Hub <security/hub/wot>`.
210
-
211
168
.. _hub/vault-management/import-vault:
212
169
213
170
Import a Vault
@@ -219,4 +176,4 @@ For a successful import, the :ref:`recovery key<desktop/password-and-recovery-ke
219
176
The import is done via the Hub vault recovery feature.
220
177
Follow the :ref:`vault online recovery guide <hub/vault-recovery/online-recovery>` and use the recovery key of the password-based vault in the process.
221
178
Don't forget to replace the vault config file ``vault.cryptomator`` at the vault storage location at the end.
222
-
Finally, to ensure that the vault cannot be unlocked with its old password anymore, remove the file ``masterkey.cryptomator`` and all backup files (ending with ``.bkup``).
179
+
Finally, to ensure that the vault cannot be unlocked with its old password anymore, remove the file ``masterkey.cryptomator`` and all backup files (ending with ``.bkup``).
Copy file name to clipboardExpand all lines: source/security/hub.rst
-27Lines changed: 0 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,30 +58,3 @@ the :ref:`User Key <security/hub/keys/user-keys>`. The Account Key acts as a pas
58
58
The Account Key itself is stored as an `ECDH-ES-encrypted JWE <https://datatracker.ietf.org/doc/html/rfc7518.html#section-4.6>`_, allowing its owner to
59
59
view it from any authorized device. Regardless it should be securely stored independently.
60
60
61
-
62
-
.. _security/hub/wot:
63
-
64
-
Web of Trust
65
-
------------
66
-
67
-
The Web of Trust (WoT) feature in Cryptomator Hub helps users verify each other's identity by signing the :ref:`User Key Pair <security/hub/keys/user-keys>` with their private keys using ECDSA.
68
-
First the trusting user needs to verify the trustee by entering the first characters of the trustee's public key fingerprint. Once signed, the proof is uploaded to Hub, where others can check its authenticity e.g. during vault sharing.
69
-
70
-
WoT also supports transitive trust, meaning if alice trusts bob, and bob trusts charlie, then alice implicitly trusts charlie. This forms a trust chain, allowing users to establish indirect trust relationships.
71
-
72
-
The maximum depth of such chains can be configured using the ``wot_max_depth`` property, which limits how far trust can extend within Hub:
73
-
74
-
* The default value is 3 ("Great-Grandchild")
75
-
* The maximum value is 9
76
-
* The minimum value, 0, means no trust chain is allowed, only direct trust relationships are considered
77
-
78
-
With the ``wot_id_verify_len`` property, the minimum length of to be entered public key fingerprint can be configured:
79
-
80
-
* The default value is 2
81
-
* The minimum value, 0, means the fingerprint of the trustee is fully shown wihtout any input needed
82
-
83
-
.. note::
84
-
85
-
If a user resets their account, their User Key Pair is regenerated, invalidating all previously established trust relationships regarding this user. As a result, the user must be re-verified by everyone who previously trusted them.
86
-
Additionally, any existing trust chains that included the user will be broken, requiring re-verification to restore trust and re-establish transitive trust relationships.
0 commit comments