update rbac

This commit is contained in:
DrMelone
2025-12-20 20:15:28 +01:00
parent 64e347c1ab
commit d403cabfa0

View File

@@ -3,9 +3,28 @@ sidebar_position: 100
title: "Role-Based Access Control (RBAC)"
---
## Access Control
- [‍🔑 Roles](./roles.md) - The roles defined in Open WebUI
- [‍🔐 Groups](./groups.md) - Setup groups of users to share access to resources
- [🔒 Permissions](./permissions.md) - Configure access controls and feature availability
Open WebUI implements a flexible and secure **Role-Based Access Control (RBAC)** system. This system allows administrators to precisely manage user capabilities and access to resources through three interconnected layers:
Roles, groups and permissions are designed to work together to provide a finegrained model for controlling user access to individual resources.
1. [**Roles**](./roles.md): The high-level user type (Admin, User, Pending). This defines the baseline trust level.
2. [**Permissions**](./permissions.md): Granular feature flags (e.g., "Can Delete Chats", "Can Use Web Search").
3. [**Groups**](./groups.md): The mechanism for organizing users, granting additional permissions, and managing shared access to resources (ACLs).
:::info Key Concept: Additive Permissions
The security model is **Additive**. Users start with their default rights, and Group memberships **add** capabilities. A user effectively has the *union* of all rights granted by their Roles and Groups.
:::
## Documentation Guide
* [‍🔑 **Roles**](./roles.md)
* Understand the difference between Admins and Users.
* Learn about Admin limitations and security/privacy configurations.
* [🔒 **Permissions**](./permissions.md)
* Explore the full list of available permission toggles.
* Understand granular controls for Chat, Workspace, and Features.
* **Security Tip**: Learn how properly configured Global Defaults protect your system.
* [‍🔐 **Groups**](./groups.md)
* Learn how to structure teams and projects.
* **Strategy**: Distinguish between "Permission Groups" (for rights) and "Sharing Groups" (for access).
* Manage Access Control Lists (ACLs) for private Models and Knowledge.