Access Rules
Control user access to specific directories with allow/deny rules.
Access rules do not apply to shares.
FileBrowser Quantum access rules differ entirely from the original FileBrowser. Rules do not carry over when migrating.
How Access Control Works
User access to files depends on three factors:
- User Scope - User must have source in their scopes
- denyByDefault - Default access behavior (grant or deny)
- Access Rules - Specific allow/deny rules for directories
Rule Evaluation
When a user accesses a file or directory:
- Direct Path Check - Look for rules on the exact path
- Recursive Parent Check - Check parent directories up to root
- Default Behavior - Grant access if no rules found (unless denyByDefault)
Rule Precedence
More specific rules override general rules
- Rule on
/folder/subfolderoverrides rule on/folder - Allow rules take priority over deny rules
Creating Access Rules
Rules are created via the Web UI:
- Go to User Management or Group Management
- Edit a user or group
- Select a source
- Click Access Rules
- Add allow/deny rules for specific directories
Source Default Behavior
denyByDefault
Configure in source settings:
With denyByDefault: true:
- Users see source exists
- No file access without explicit allow rules
- Must create allow rules for access
Examples
Example 1: Basic Deny
Rule: Deny user graham access to /
Result: graham cannot access any files or directories
Example 2: Allow Specific Subfolder
Rules:
- Deny user
grahamaccess to/ - Allow user
grahamaccess to/subpath
Result: graham can only access /subpath and subdirectories
Example 3: Deny All with Exceptions
Rules:
denyAllaccess to/vip- Allow user
adminaccess to/vip
Result: Only admin can access /vip
Example 4: Departmental Access
Rules:
- Allow group
salesaccess to/departments/sales - Allow group
engineeringaccess to/departments/engineering - Deny all users access to
/departments
Result: Each department accesses only their folder
Example 5: Read-Only Area
Rules:
- Allow all users read access to
/public - Deny all users write access to
/public - Allow user
publisherwrite access to/public
Result: Everyone can read, only publisher can write
Rule Types
Allow Rules
Grant access to a path (read, write, execute, delete)
Deny Rules
Explicitly deny access to a path
DenyAll Rules
Special rule denying all users (requires specific allow to override)
Group-Based Rules
Apply rules to groups for easier management:
- Create user groups
- Assign users to groups
- Create access rules for groups
- All members inherit rules
Benefits:
- Easier to manage large user bases
- Consistent permissions
- Single point of updates
Best Practices
Use Least Privilege
Start minimal, add as needed:
- Set
denyByDefault: true - Create specific allow rules
- Review regularly
Organize with Groups
Use groups instead of per-user rules:
- Create groups: sales, engineering, admin
- Apply rules to groups
- Add/remove users from groups
Plan Directory Structure
Design directories with access control in mind:
Test Access
Always test after creating rules:
- Log in as target user
- Verify expected access
- Check both allow and deny scenarios
Common Patterns
OIDC
OIDC authentication often uses groups to control access. It is common to set a source as denyByDefault and then configure rules for OIDC groups.
Troubleshooting
For common issues and solutions, see the Troubleshooting guide.