Permissions vs Privileges
General Notes
Usually it is not required for a application to check the privileges/permissions of a given session (or set of principals) as this evaluation can be left to the repository.
For rare cases where the application needs to understand if a given session is
actually allowed to perform a given action, it is recommend to use Session.hasPermission(String, String)
or JackrabbitSession.hasPermission(String, String...)
In order to test permissions that are not reflected in the action constants
defined on Session or JackrabbitSession, the default implementation also allows
to pass the names of the Oak internal permission.
To evaluate privileges granted for a given editing session AccessControlManager.hasPrivileges(String, Privilege[]),
AccessControlManager.getPrivileges(String) can be used. The JackrabbitAccessControlManager defines variants of both
methods that in addition take a set of Principal. If the editing session as sufficient permissions these methods can
be used to evaluate/obtain privileges for a different set of principals than associated with the editing session.
Since Oak 1.42.0 JackrabbitAccessControlManager defines JackrabbitAccessControlManager.getPrivilegeCollection(String)
and JackrabbitAccessControlManager.getPrivilegeCollection(String, Set) which allows for efficient evaluation if a given set
of privileges are granted at a given path. It allows to avoid repeated calls to hasPrivileges for the same path or
manual resolution of privilege aggregation (see OAK-9494
for details).
The subtle differences between the permission-testing Session and the evaluation
of privileges on AccessControlManager are listed below.
Testing Permissions
Variants
Session.hasPermission(String absPath, String actions)Session.checkPermission(String absPath, String actions)JackrabbitSession.hasPermission(String absPath, @Nonnull String... actions)
Where
absPathis an absolute path pointing to an existing or non-existing item (node or property)actionsdefines a comma-separated string (or string array respectively) of the actions defined onSessionandJackrabbitSession(see below). With the default implementation also Oak internal permission names are allowed ( Note: permission names != privilege names)
See section Permissions for a comprehensive list and the mapping from actions to permissions.
Characteristics
- API call always supported even if access control management is not part of the feature set (see corresponding repository descriptor).
- Note:
ACTION_ADD_NODEis evaluating if the node at the specified absPath can be added; i.e. the path points to the non-existing node you want to add - Not possible to evaluate custom privileges with this method as those are not respected by the default permission evaluation.
- Restrictions will be respected as possible with the given (limited) information
Testing Privileges
Variants
AccessControlManager.hasPrivileges(String absPath, Privilege[] privileges)AccessControlManager.getPrivileges(String absPath)JackrabbitAccessControlManager.getPrivilegeCollection(String absPath)followed byPrivilegeCollection.includes(String...)
Where
absPathmust point to an existing Node (i.e. existing and accessible to the editing session)privilegesrepresent an array of supported privileges (see corresponding API calls)
For testing purpose the Jackrabbit extension further allows to verify the privileges
granted to a given combination of principals, which may or may not reflect the actual
principal-set assigned to a given Subject. These calls (see below) however
requires the ability to read access control content on the target path.
JackrabbitAccessControlManager.hasPrivileges(String absPath, Set<Principal> principals, Privilege[] privileges)JackrabbitAccessControlManager.getPrivileges(String absPath, Set<Principal> principals)JackrabbitAccessControlManager.getPrivilegeCollection(String absPath, Set<Principal> principals)(see also section Privilege Management)
Characteristics
- Only available if access control management is part of the supported feature set of the JCR repository.
- Built-in and/or custom privileges can be tested
jcr:addChildNodeevaluates if any child can be added at the parent node identify by the specified absPath. The name of child is not known here!- Restrictions may or may not be respected
- Default implementation close to real permission evaluation (not exactly following the specification)

