Hi David,

I hate to sound like I'm stating the bleeding obvious, but what about just 
looking at the authz file with a text editor?

It's not hard to interpret if your usernames are sensible.  I've recently spent 
a little while making sure the projects are sorted in a sensible order, so 
finding particular projects is quite easy (apart from just using the built-in 
search functions).

Having said that, we use a home-grown tool (written by a long-gone colleague in 
C# and backed by an SQL database for administration items) for some network 
administration tasks.  Mostly, this is useful as a lazy way of adding or 
deleting projects.  I still use the text editor for modifying user permissions 
(because it's faster and easier).

Regards,

Geoff

        From: David Aldrich
        Sent: Friday, 27 September 2013 1:08 AM

        Hi Mark

        Thanks, that's a very helpful suggestion.

        Best regards

        David

         

        From: Mark Phippard
        Sent: 26 September 2013 16:06

        On Thu, Sep 26, 2013 at 11:02 AM, David Aldrich  wrote:

                Hi Mark

                Thanks for replying.  By auditing, I mean the ability to easily 
see who has access to a specified folder.  I think we already have the 
recording of changes covered.  svnauthz_accessof looks interesting, but it 
reports whether a specified user has access.  I would prefer to ask 'who has 
access?' to a specified folder.

        OK.  I am not aware of any tools commercial or otherwise that provide 
the information that way.  If you use groups and have a finite number of them, 
it seems like it would be a fairly simple script to check each group against 
the path using the command line tool and report which ones have access.

        -- 
        Thanks
        
        Mark Phippard
        http://markphip.blogspot.com/ 

-- 
Apologies for the auto-generated legal boilerplate added by our IT department:


- The contents of this email, and any attachments, are strictly private
and confidential.
- It may contain legally privileged or sensitive information and is intended
solely for the individual or entity to which it is addressed.
- Only the intended recipient may review, reproduce, retransmit, disclose,
disseminate or otherwise use or take action in reliance upon the information
contained in this email and any attachments, with the permission of
Australian Arrow Pty. Ltd.
- If you have received this communication in error, please reply to the sender
immediately and promptly delete the email and attachments, together with
any copies, from all computers.
- It is your responsibility to scan this communication and any attached files
for computer viruses and other defects and we recommend that it be
subjected to your virus checking procedures prior to use.
- Australian Arrow Pty. Ltd. does not accept liability for any loss or damage
of any nature, howsoever caused, which may result
directly or indirectly from this communication or any attached files. 


Reply via email to