Access Resource

By Daniel Berthereau Allow a visitor or a user to access to selected restricted resources via a request, an ip check, an authentication, or a token.
Download 3.4.17

Access Resource (module for Omeka S)

New versions of this module and support for Omeka S version 3.0 and above are available on GitLab, which seems to respect users and privacy better than the previous repository.

Access Resource is a module for Omeka S that allows to protect files to be accessed from the anonymous visitors, but nevertheless available globally or on requests by guests users, restricted to a list of ips, or available by an email or a token. Start and end dates of an embargo can be used too, separately or not.

Furthermore, you can set the right to see a resource at the media level, so the item and media metadata are visible and the visitors know that a media exist. The file itself (the original one and eventually the large and other derivatives files) is replaced by a fake file, unless a specific right is granted.

See below for more information on usage.

Installation

Associated modules

To allow access to restricted resources for user with role "Guest", the module will need to identify users, generally with the module Guest or Guest Role.

The public part can be managed easily via the module Blocks Disposition, but it is recommended to use resource page blocks if the theme supports them.

The module is compatible with the module Statistics. It is important to redirect download urls to the module (see below config of ".htaccess").

Incompatibility

Since version 3.4.17, the module is compatible with module Group.

Installation of the module

See general end user documentation for installing a module.

  • From the zip

Download the last release AccessResource.zip from the list of releases, and uncompress it in the modules directory.

  • From the source and for development:

If the module was installed from the source, rename the name of the folder of the module to AccessResource.

Configuration of the web server

Omeka does not manage the requests of the files of the web server (generally Apache or Nginx): they are directly served by it, without any control. To protect them, you have to tell the web server to redirect the users requests to Omeka, so it can check the rights, before returning the file or a forbidden response. You can adapt routes.ini as you wish too, but this is useless in most of the cases.

Apache

The Apache file ".htaccess" at the root of Omeka should be updated to avoid direct access to files and to redirect urls to the module.

For that, you have to adapt the following code to your needs in the main .htaccess at the root of Omeka, in a .htaccess file in the files directory, or directly in the config of the virtual host of the server (quicker). The example below is written for the Omeka .htaccess file. If you prefer to use other files, adapt the paths.

In this example, all original and large files will be protected: a check will be done by the module before delivering files. If the user has no access to a file, a fake file is displayed.

The small derivatives files (medium and square thumbnails), can be protected too, but it is generally useless. Anyway, it depends on the original images.

When Omeka S is installed at the root of a domain or a sub-domain

Insert the following lines at line 4 of .htaccess, just after RewriteEngine On, eventually adding |medium|square to the list of thumbnails:

# Set rule for original and selected derivative files (usually at least large thumbnails).
RewriteRule "^files/(original|large)/(.*)$" "/access/files/$1)/$2" [P]

An alternative with flag [L]:

# Set rule for original and selected derivative files (usually at least large thumbnails).
RewriteRule "^files/(original|large)/(.*)$" "%{REQUEST_SCHEME}://%{HTTP_HOST}/access/files/$1/$2" [L]
When Omeka S is installed in a sub-path (https://example.org/digital-library/)

Insert the following lines at line 4 of .htaccess, just after RewriteEngine On, adapting it to your real config (here, the sub-path is digital-library), eventually adding |medium|square to the list of thumbnails:

# Set rule for original and selected derivative files (usually at least large thumbnails).
RewriteRule "^files/(original|large)/(.*)$" "/digital-library/access/files/$1/$2" [P]
Common issues

First, try with the alternative (flag [P] or [L]).

  • Unable to redirect to a virtual proxy with https

The config uses flag [P] for an internal fake Proxy, so Apache rewrites the path like a proxy. So if there is a redirection to a secured server (https), the certificate should be running and up-to-date and the option SSLProxyEngine on should be set in the Apache config of the web server.

Anyway, if you have access to it, you can include all rules inside it directly (ProxyPass). If you don't have access to the Apache config, just use the full unsecure url with http:// (with real domain or %{HTTP_HOST}), for the internal proxy. Because it is a fake proxy, it doesn't matter if the internal redirect url is unsecure:

# Set rule for original and selected derivative files (usually at least large thumbnails).
RewriteRule "^files/(original|large)/(.*)$" "http://%{HTTP_HOST}/digital-library/access/files/$1/$2" [P]

Compatibility with module Statistics

The module is compatible with the module Statistics.

Because Omeka doesn't protect files by default, it is important to redirect the urls of the original files to the routes of the module Access Resource. If you keep the redirection with download, the check for restricted access won't be done, so a private file will become public, even if a user as a no restricted access to it. For example:

# Redirect direct access to files to the module Access Resource.
RewriteRule "^files/(original|large)/(.*)$" "/access/files/$1/$2" [P]

# Redirect direct download of files to the module Access Resource.
RewriteRule "^download/files/(original|large)/(.*)$" "/access/files/$1/$2" [P]

In fact, if not redirected, it acts the same way than a direct access to a private file in Omeka: they are not protected and everybody who knows the url, in particular Google, the well-known private life hacker, via Gmail, Chrome, Android, etc., will have access to it, even if it's exactly what you don't want.

Nginx

The configuration of Apache above should be adapted for Nginx.

Usage

Omeka has two modes of visibility: public or private. This module adds a second check for anonymous or specific users: the right to access to a resource. This rights has four levels: free, restricted, protected or forbidden. These access levels applies on record or media files, but the current version supports only protection of media contents.

So an anonymous visitor can see a public media, but can view the file only if the level is set to free. The user should have a permission when the level is restricted or protected, and cannot see it in any case when the level is forbidden, even if the media is public.

There is no difference between restricted or protected when the type of protection is limited to files, that is the only type in the current version of the module.

The permission to see a restricted content can be done via many ways: Users can be checked via the role guest, the authentication via an external identity provider (module CAS, LDAP and Single Sign On), by ip, by email or by a token.

One important thing to understand is to choose to define the access for each type of resource: item sets, items and media and to choose if the access is done recursively during storing or in request. If the request is set to apply recursively for an item set, all items and medias attached to it will be available. If the request is set to apply recursively for an item, all medias attached to it will be available. So when an item set or an item is saved and when a request is validated, set if the access or the request applies recursively.

Take care that for resource, the recursivity should be set each time it is saved, if needed, else access won't be updated to the attached resources. It allows to have specific access for specific items or medias. Furthermore, this mechanism does not apply when the access status is set via property. In that case, all resources are managed individually.

Finally, the option applies only to existing resources: if an item is created after a change in an item set, it won't apply to it, so you will need to set the right mode or to update the item set with the recursive option set.

When an embargo is set, it can be bypassed, or not, for the users. Only files can be under embargo currently.

Access mode

The rights to see the files are controlled on the fly. The restricted visibility can be managed in multiple ways:

  • Global modes
  • ip: all visitors with a specific ip, for example the ip of the physical library or the one of a researcher, can have access to all the restricted files. Ip can be configured to access specific item sets.
  • guest: all guest users have access to all the restricted files.
  • external: all users authenticated via an external identity provider (currently via module CAS, later for module Ldap and SingleSignOn) have access to media contents.
  • Individual modes
  • user: each file should be made accessible by a specific user one by one. So the module has some forms to manage individual requests and accesses.
  • email: anybody authenticated via an email have access to specific media contents. This protection is simple and light, but not the most secure.
  • token: all users or visitor authenticated via a token have access to specific media contents.

Individual modes require that an admin allow each right for each resource.

Identification of the restricted resources

After the configuration, you should identify all resources that you want to make available via a restricted access. By default, private resources remain private, so you need to allow visitors to know that they exist. That is to say you can keep some private resources private, and some other ones available on request, or globally.

There are two ways to indicate which resources are restricted.

  • By default, it is a specific setting available as a radio button in the advanced tab of the resource form.
  • The second way is to set a value to a specified property, for example curation:access. The value can be "free", "restricted", "protected" or "forbidden". The property and the names can be translated or modified in the config. It is recommended to create a custom vocab and to use it via the resource templates to avoid errors in the values.

A private media remains private. A public media will be accessible only if its status is not forbidden and not during an embargo, if any.

Note that a public item can have a private media and vice-versa. So, most of the time, the value should be set in the metadata of the media. The value can be specified for the item too to simplify management.

Embargo

By construction, the embargo works only on the media files: metadata are always visible for public and restricted resources.

An option in the config can be used to use it with or without the restricted access.

To create an embargo on a file, simply set the dates in the advanced tab or use properties curation:start and/or curation:end, or the ones specified in the config.

If you use a property to define the date of the embargo, it is recommended to use the datatype "numeric timestamp" from the module Numeric Datatypes, but a literal is fine. The date must be an iso one (2022-03-14). A time can be set too (2022-03-14T12:34:56).

A check is automatically done when an anonymous visitor or a restricted user is accessing a file.

Management of requests

If you choose modes ip, guest, or external, there is nothing to do more. Once users are authenticated or authorized, they will be able to see the files.

In the case of the single modes user, email or token, there are two ways to process.

  • The admin can made some item sets, items or medias available directly in the menu "Access requests" in the sidebar. Simply add a new access, select a resource and a user, a email or a token, and the person will be able to view it.

  • The user or visitor can request an access to a specific resource. It can be done directly via a button, for logged users, or via a contact form for the anonymous visitors. The contact form may be added by this module or the module Contact Us. After the request, the admin will receive an email to accept or reject the request.

Once accepted, the requester will receive an email with an url to click, that will add a session cookie that will allow to browse the selected resources.

In public front-end, a dashboard is added for visitors: /s/my-site/access-request. Guest users have a specific board too: /s/my-site/guest/access-request.

TODO

  • [x] Add a feature to uncouple visibility and access (manage them separetely). Make this the default mode?
  • [x] Make metadata or resource hidden, not only files (so a more restricted type of access).
  • [x] Make resources available by token in global mode.
  • [x] Make resources available by token only, not login (like module Contribute).
  • [x] Make non-exclusive mode "ip" and "user".
  • [ ] Fix ip check for ipv6.
  • [ ] Use Omeka Store instead of local file system.
  • [x] Manage ip by item set or by user instead of sites?
  • [x] Store openess in a specific table for performance and to manage embargo easier.
  • [x] Manage the case where the embargo dates are private.
  • [x] Add a mode to check for a specific value in the reserved access property instead of exist/not exist.
  • [x] Reindexation (trigger event) when embargo is updated automatically.
  • [x] Recheck all new features with modes "individual".
  • [x] Manage embargo dates separately from the property values.

Warning

Use it at your own risk.

It’s always recommended to backup your files and your databases and to check your archives regularly so you can roll back if needed.

Troubleshooting

See online issues on the module issues page on GitLab.

License

Module

This module is published under the CeCILL v2.1 license, compatible with GNU/GPL and approved by FSF and OSI.

This software is governed by the CeCILL license under French law and abiding by the rules of distribution of free software. You can use, modify and/ or redistribute the software under the terms of the CeCILL license as circulated by CEA, CNRS and INRIA at the following URL "http://www.cecill.info".

As a counterpart to the access to the source code and rights to copy, modify and redistribute granted by the license, users are provided only with a limited warranty and the software’s author, the holder of the economic rights, and the successive licensors have only limited liability.

In this respect, the user’s attention is drawn to the risks associated with loading, using, modifying and/or developing or reproducing the software by the user in light of its specific status of free software, that may mean that it is complicated to manipulate, and that also therefore means that it is reserved for developers and experienced professionals having in-depth computer knowledge. Users are therefore encouraged to load and test the software’s suitability as regards their requirements in conditions enabling the security of their systems and/or data to be ensured and, more generally, to use and operate it in the same conditions as regards security.

The fact that you are presently reading this means that you have had knowledge of the CeCILL license and that you accept its terms.

Image Locked file

The image Locked file is licensed under GNU/GPL.

Copyright

Version Released Minimum Omeka version
3.4.17July 24, 2023 [info]^4.0.0
3.4.16May 29, 2023 [info]^3.1.0 || ^4.0.0
3.4.0.15February 27, 2023 [info]^3.1.0 || ^4.0.0
3.4.0.14February 06, 2023 [info]^3.1.0 || ^4.0.0
3.4.0.13January 09, 2023 [info]^3.1.0 || ^4.0.0
3.3.0.12October 31, 2022 [info]^3.1.0
3.3.0.11March 21, 2022 [info]^3.1.0
3.3.0.10September 27, 2021 [info]^3.1.0
3.3.0.8February 22, 2021 [info]^3.0.0
3.3.0.7February 15, 2021 [info]^3.0.0
3.3.0.6January 11, 2021 [info]^3.0.0
3.3.0.5January 04, 2021 [info]^3.0.0
3.0.5April 19, 2020 [info]^1.2.0 || ^2.0.0
3.0.4February 09, 2020 [info]^1.2.0 || ^2.0.0
3.0.3January 19, 2020 [info]^1.2.0 || ^2.0.0