Skip to content

Commit b3c3f98

Browse files
committed
Revert "Merge pull request #65 from cryptomator/feature/hub-1.4.0-features"
This reverts commit 8b4f752, reversing changes made to 2c3d36e.
1 parent 8b4f752 commit b3c3f98

File tree

10 files changed

+1
-104
lines changed

10 files changed

+1
-104
lines changed

source/hub/user-group-management.rst

Lines changed: 0 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -40,36 +40,3 @@ A good step-by-step guide for connecting Microsoft Entra with OpenID Connect can
4040

4141
.. warning::
4242
Regardless of your choice, your Keycloak instance always contains two local users: ``admin`` and ``syncer``. **Do not edit or delete them!** The first one is for administration tasks and the second one is used to synchronize users and groups between Keycloak and Hub.
43-
44-
45-
.. _hub/user-group-management/roles:
46-
47-
Roles
48-
-------------
49-
50-
There are four different roles in Cryptomator Hub:
51-
52-
* **user**: A user can open vaults and manage their own account.
53-
* **admin**: An admin manages the Keycloak realm, can see the audit log, and can create vaults.
54-
* **create-vault**: Only users with this role can create vaults. The role is inherited by the `admin` role.
55-
56-
The ``user``, ``admin``, and ``create-vault`` roles are assigned to users or groups via the Keycloak admin console by an existing user with the ``admin`` role.
57-
58-
.. _hub/user-group-management/roles/create-vault:
59-
60-
Create Vault Role
61-
^^^^^^^^^^^^^^^^^
62-
63-
By default, this role is only assigned to the ``admin`` role. This means that only users with the ``admin`` role can create vaults. If you want to allow other users to create vaults, you can assign the ``create-vault`` role to them directly or via a group.
64-
65-
If you want that all users can create vaults, assigning the ``create-vault`` role as transient role to the ``user`` role. This way, every user will have the ``create-vault`` role as well.
66-
67-
To allow all users vault creation, assign ``create-vault`` as a transient role to the ``user`` role:
68-
69-
1. Open the Keycloak admin console.
70-
2. Select ``Realm roles``.
71-
3. Select the ``user`` role.
72-
4. Select ``Assign role``.
73-
5. Select the ``create-vault`` role.
74-
6. Apply with ``Assign``.
75-

source/hub/vault-management.rst

Lines changed: 1 addition & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,6 @@ Alternatively, you can also access the list by clicking on the ``Vaults`` tab in
3434
Create a Vault
3535
--------------
3636

37-
.. note::
38-
Creating vaults require the ``create-vault`` role. :ref:`Here <hub/user-group-management/roles>` you can read more about roles.
39-
4037
To create a vault in Hub, navigate to the vault list and click on the ``Create Vault`` button in the top right corner.
4138
Every vault has a name and optionally a description.
4239
Fill out the form and continue the process by clicking the ``Next`` button in the right corner.
@@ -168,46 +165,6 @@ To archive the vault, click on the ``Archive Vault`` button in the :ref:`vault d
168165

169166
You can unarchive it by clicking on the ``Owned by me`` tab in the navigation bar, select the vault and clicking on the ``Reactive Vault`` button.
170167

171-
.. _hub/vault-management/wot:
172-
173-
Web of Trust
174-
^^^^^^^^^^^^
175-
176-
Cryptomator Hub uses a Web of Trust (WoT) to verify the identity of users during vault sharing.
177-
178-
The WoT state of a user is displayed in the vault details page. The state can be one of the following:
179-
180-
* **Unverified**: There is no turst chain between you and the specific user. Indicated with a red shield. You can change this by verifying the user.
181-
* **Verified**: There is a trust chain between you and the specific user. Indicated with a green shield. You or a user you trust has verified the user.
182-
183-
To verify ``alice``, click on the red shield icon and select ``Check Idenditiy...``
184-
185-
.. image:: ../img/hub/wot-carol-unverified.png
186-
:alt: Carol is unverified regarding its Web of Trust state
187-
:width: 920px
188-
189-
While verifiying a user, you need to enter the first characters of the user's public key fingerprint. This fingerprint is displayed in user coresponding user profile page.
190-
191-
.. image:: ../img/hub/wot-carol-verify.png
192-
:alt: Verify Alice regarding its Web of Trust state
193-
:width: 920px
194-
195-
``alice`` is now verified
196-
197-
.. image:: ../img/hub/wot-carol-verified.png
198-
:alt: Alice is verified regarding its Web of Trust state
199-
:width: 920px
200-
201-
The verification process is logged in the audit log with event type ``Signed Identity``
202-
203-
.. image:: ../img/hub/wot-audit-log.png
204-
:alt: WAudit log
205-
:width: 920px
206-
207-
``signature still valid`` means that the ``identiy`` has still the same key. If the user account gets reset after verification, this message changes to ``was valid; signed key changed by now`` and the user needs to get verified again.
208-
209-
You can read more details about Web of Trust in the :ref:`Security section of Hub <security/hub/wot>`.
210-
211168
.. _hub/vault-management/import-vault:
212169

213170
Import a Vault
@@ -219,4 +176,4 @@ For a successful import, the :ref:`recovery key<desktop/password-and-recovery-ke
219176
The import is done via the Hub vault recovery feature.
220177
Follow the :ref:`vault online recovery guide <hub/vault-recovery/online-recovery>` and use the recovery key of the password-based vault in the process.
221178
Don't forget to replace the vault config file ``vault.cryptomator`` at the vault storage location at the end.
222-
Finally, to ensure that the vault cannot be unlocked with its old password anymore, remove the file ``masterkey.cryptomator`` and all backup files (ending with ``.bkup``).
179+
Finally, to ensure that the vault cannot be unlocked with its old password anymore, remove the file ``masterkey.cryptomator`` and all backup files ( ending with ``.bkup``).
-163 KB
Loading
-114 KB
Loading
-118 KB
Loading

source/img/hub/wot-audit-log.png

-447 KB
Binary file not shown.
-289 KB
Binary file not shown.
-258 KB
Binary file not shown.
-324 KB
Binary file not shown.

source/security/hub.rst

Lines changed: 0 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -58,30 +58,3 @@ the :ref:`User Key <security/hub/keys/user-keys>`. The Account Key acts as a pas
5858
The Account Key itself is stored as an `ECDH-ES-encrypted JWE <https://datatracker.ietf.org/doc/html/rfc7518.html#section-4.6>`_, allowing its owner to
5959
view it from any authorized device. Regardless it should be securely stored independently.
6060

61-
62-
.. _security/hub/wot:
63-
64-
Web of Trust
65-
------------
66-
67-
The Web of Trust (WoT) feature in Cryptomator Hub helps users verify each other's identity by signing the :ref:`User Key Pair <security/hub/keys/user-keys>` with their private keys using ECDSA.
68-
First the trusting user needs to verify the trustee by entering the first characters of the trustee's public key fingerprint. Once signed, the proof is uploaded to Hub, where others can check its authenticity e.g. during vault sharing.
69-
70-
WoT also supports transitive trust, meaning if alice trusts bob, and bob trusts charlie, then alice implicitly trusts charlie. This forms a trust chain, allowing users to establish indirect trust relationships.
71-
72-
The maximum depth of such chains can be configured using the ``wot_max_depth`` property, which limits how far trust can extend within Hub:
73-
74-
* The default value is 3 ("Great-Grandchild")
75-
* The maximum value is 9
76-
* The minimum value, 0, means no trust chain is allowed, only direct trust relationships are considered
77-
78-
With the ``wot_id_verify_len`` property, the minimum length of to be entered public key fingerprint can be configured:
79-
80-
* The default value is 2
81-
* The minimum value, 0, means the fingerprint of the trustee is fully shown wihtout any input needed
82-
83-
.. note::
84-
85-
If a user resets their account, their User Key Pair is regenerated, invalidating all previously established trust relationships regarding this user. As a result, the user must be re-verified by everyone who previously trusted them.
86-
Additionally, any existing trust chains that included the user will be broken, requiring re-verification to restore trust and re-establish transitive trust relationships.
87-

0 commit comments

Comments
 (0)