๐Ÿ“… let's chat! explore the endless possibilities creating industries that don't exist. click here

obsidian-enterprise-rbac

Implement team vault access patterns and role-based controls. Use when managing shared vaults, implementing access controls, or building team collaboration features for Obsidian. Trigger with phrases like "obsidian team", "obsidian access control", "obsidian enterprise", "shared vault permissions". allowed-tools: Read, Write, Edit version: 1.0.0 license: MIT author: Jeremy Longshore <jeremy@intentsolutions.io>

Allowed Tools

No tools specified

Provided by Plugin

obsidian-pack

Claude Code skill pack for Obsidian plugin development and vault management (24 skills)

saas packs v1.0.0
View Plugin

Installation

This skill is included in the obsidian-pack plugin:

/plugin install obsidian-pack@claude-code-plugins-plus

Click to copy

Instructions

# Obsidian Enterprise RBAC ## Overview Implement role-based access control patterns for team vaults and shared Obsidian environments. ## Prerequisites - Understanding of RBAC concepts - Multi-user vault setup - Backend service for authentication (optional) ## Access Control Concepts ### Role Hierarchy | Role | Read | Write | Delete | Admin | Settings | |------|------|-------|--------|-------|----------| | Viewer | Yes | No | No | No | No | | Editor | Yes | Yes | No | No | No | | Contributor | Yes | Yes | Own | No | No | | Manager | Yes | Yes | Yes | No | View | | Admin | Yes | Yes | Yes | Yes | Full | ### Folder-Based Permissions ``` vault/ โ”œโ”€โ”€ public/ # All roles can read โ”œโ”€โ”€ team/ # Editors+ can read/write โ”œโ”€โ”€ projects/ โ”‚ โ”œโ”€โ”€ project-a/ # Project members only โ”‚ โ””โ”€โ”€ project-b/ # Project members only โ”œโ”€โ”€ management/ # Managers+ only โ””โ”€โ”€ admin/ # Admins only ``` ## Instructions ### Step 1: Permission System ```typescript // src/rbac/permissions.ts export type Role = 'viewer' | 'editor' | 'contributor' | 'manager' | 'admin'; export type Permission = 'read' | 'write' | 'delete' | 'admin' | 'settings'; export interface User { id: string; name: string; email: string; role: Role; teamIds: string[]; projectIds: string[]; } export interface FolderPermission { path: string; allowedRoles: Role[]; allowedTeams?: string[]; allowedUsers?: string[]; } const rolePermissions: Record = { viewer: ['read'], editor: ['read', 'write'], contributor: ['read', 'write', 'delete'], // delete own only manager: ['read', 'write', 'delete', 'settings'], admin: ['read', 'write', 'delete', 'admin', 'settings'], }; export class PermissionService { private currentUser: User | null = null; private folderPermissions: FolderPermission[] = []; setCurrentUser(user: User): void { this.currentUser = user; } setFolderPermissions(permissions: FolderPermission[]): void { this.folderPermissions = permissions; } hasPermission(permission: Permission): boolean { if (!this.currentUser) return false; return rolePermissions[this.currentUser.role].includes(permission); } canAccessFolder(path: string): boolean { if (!this.currentUser) return false; // Admin can access everything if (this.currentUser.role === 'admin') return true; // Check folder permissions const folderPerm = this.findFolderPermission(path); if (!folderPerm) return true; // No restrictions // Check role if (folderPerm.allowedRoles.includes(this.currentUser.role)) { return true; } // Check team membership if (folderPerm.allowedTeams) { const hasTeam = folderPerm.allowedTeams.some( teamId => this.currentUser!.teamIds.includes(teamId) ); if (hasTeam) return true; } // Check user allowlist if (folderPerm.allowedUsers) { if (folderPerm.allowedUsers.includes(this.currentUser.id)) { return true; } } return false; } canReadFile(path: string): boolean { return this.hasPermission('read') && this.canAccessFolder(path); } canWriteFile(path: string): boolean { return this.hasPermission('write') && this.canAccessFolder(path); } canDeleteFile(path: string, ownerId?: string): boolean { if (!this.currentUser) return false; // Contributor can only delete own files if (this.currentUser.role === 'contributor') { return ownerId === this.currentUser.id && this.canAccessFolder(path); } return this.hasPermission('delete') && this.canAccessFolder(path); } private findFolderPermission(path: string): FolderPermission | null { // Find most specific matching folder permission let match: FolderPermission | null = null; let matchLength = 0; for (const perm of this.folderPermissions) { if (path.startsWith(perm.path) && perm.path.length > matchLength) { match = perm; matchLength = perm.path.length; } } return match; } } ``` ### Step 2: Protected Operations Wrapper ```typescript // src/rbac/protected-vault.ts import { App, TFile, Notice } from 'obsidian'; import { PermissionService } from './permissions'; export class ProtectedVault { constructor( private app: App, private permissions: PermissionService ) {} async readFile(file: TFile): Promise { if (!this.permissions.canReadFile(file.path)) { new Notice('Permission denied: Cannot read this file'); return null; } return this.app.vault.read(file); } async writeFile(file: TFile, content: string): Promise { if (!this.permissions.canWriteFile(file.path)) { new Notice('Permission denied: Cannot write to this file'); return false; } await this.app.vault.modify(file, content); return true; } async createFile(path: string, content: string): Promise { if (!this.permissions.canWriteFile(path)) { new Notice('Permission denied: Cannot create files in this folder'); return null; } return this.app.vault.create(path, content); } async deleteFile(file: TFile, ownerId?: string): Promise { if (!this.permissions.canDeleteFile(file.path, ownerId)) { new Notice('Permission denied: Cannot delete this file'); return false; } await this.app.vault.delete(file); return true; } getAccessibleFiles(): TFile[] { return this.app.vault.getMarkdownFiles().filter( file => this.permissions.canReadFile(file.path) ); } } ``` ### Step 3: User Management ```typescript // src/rbac/user-manager.ts import { Plugin } from 'obsidian'; export interface TeamConfig { id: string; name: string; members: string[]; folders: string[]; } export interface RBACConfig { enabled: boolean; users: Record; teams: TeamConfig[]; folderPermissions: FolderPermission[]; } export class UserManager { private config: RBACConfig; private plugin: Plugin; constructor(plugin: Plugin) { this.plugin = plugin; this.config = this.loadConfig(); } private loadConfig(): RBACConfig { // Load from plugin settings or external config return { enabled: true, users: {}, teams: [], folderPermissions: [], }; } getCurrentUser(): User | null { // Get current user from auth system // This could be from local storage, external auth, etc. const userId = this.getCurrentUserId(); if (!userId) return null; const userConfig = this.config.users[userId]; if (!userConfig) return null; return { id: userId, name: this.getUserName(userId), email: this.getUserEmail(userId), role: userConfig.role, teamIds: userConfig.teams, projectIds: this.getProjectsForUser(userId), }; } private getCurrentUserId(): string | null { // Implementation depends on auth system // Could be from: local file, external service, etc. return localStorage.getItem('obsidian-user-id'); } private getUserName(userId: string): string { // Fetch from user directory return userId; } private getUserEmail(userId: string): string { // Fetch from user directory return `${userId}@example.com`; } private getProjectsForUser(userId: string): string[] { // Get projects user has access to return []; } getTeams(): TeamConfig[] { return this.config.teams; } getFolderPermissions(): FolderPermission[] { return this.config.folderPermissions; } // Admin functions async addUser(userId: string, role: Role, teams: string[]): Promise { this.config.users[userId] = { role, teams }; await this.saveConfig(); } async updateUserRole(userId: string, role: Role): Promise { if (this.config.users[userId]) { this.config.users[userId].role = role; await this.saveConfig(); } } async addFolderPermission(permission: FolderPermission): Promise { this.config.folderPermissions.push(permission); await this.saveConfig(); } private async saveConfig(): Promise { // Save to plugin data or external storage } } ``` ### Step 4: Audit Logging ```typescript // src/rbac/audit-log.ts export interface AuditEntry { timestamp: string; userId: string; action: 'read' | 'write' | 'delete' | 'permission_denied' | 'login' | 'logout'; resource: string; details?: Record; success: boolean; } export class AuditLogger { private entries: AuditEntry[] = []; private maxEntries = 1000; log(entry: Omit): void { const fullEntry: AuditEntry = { ...entry, timestamp: new Date().toISOString(), }; this.entries.push(fullEntry); // Trim old entries if (this.entries.length > this.maxEntries) { this.entries = this.entries.slice(-this.maxEntries); } // Console log for debugging console.log(`[Audit] ${fullEntry.action}: ${fullEntry.resource}`, { user: fullEntry.userId, success: fullEntry.success, }); } logAccess(userId: string, path: string, action: 'read' | 'write' | 'delete', success: boolean): void { this.log({ userId, action, resource: path, success, }); } logPermissionDenied(userId: string, path: string, requestedAction: string): void { this.log({ userId, action: 'permission_denied', resource: path, details: { requestedAction }, success: false, }); } getEntries(filter?: { userId?: string; action?: AuditEntry['action']; since?: Date; }): AuditEntry[] { let results = [...this.entries]; if (filter?.userId) { results = results.filter(e => e.userId === filter.userId); } if (filter?.action) { results = results.filter(e => e.action === filter.action); } if (filter?.since) { results = results.filter(e => new Date(e.timestamp) >= filter.since! ); } return results; } getPermissionDenials(): AuditEntry[] { return this.entries.filter(e => e.action === 'permission_denied'); } export(): string { return JSON.stringify(this.entries, null, 2); } } ``` ### Step 5: UI Integration ```typescript // src/rbac/rbac-ui.ts import { App, Modal, Setting } from 'obsidian'; import { Role, User, PermissionService } from './permissions'; export class UserRoleModal extends Modal { private user: User; private onSave: (role: Role) => void; constructor(app: App, user: User, onSave: (role: Role) => void) { super(app); this.user = user; this.onSave = onSave; } onOpen() { const { contentEl } = this; contentEl.empty(); contentEl.createEl('h2', { text: `Edit User: ${this.user.name}` }); new Setting(contentEl) .setName('Role') .setDesc('User role determines permissions') .addDropdown(dropdown => { dropdown .addOption('viewer', 'Viewer') .addOption('editor', 'Editor') .addOption('contributor', 'Contributor') .addOption('manager', 'Manager') .addOption('admin', 'Admin') .setValue(this.user.role) .onChange(value => { this.user.role = value as Role; }); }); new Setting(contentEl) .addButton(btn => btn .setButtonText('Save') .setCta() .onClick(() => { this.onSave(this.user.role); this.close(); })) .addButton(btn => btn .setButtonText('Cancel') .onClick(() => this.close())); } } // Status bar indicator export function addRoleIndicator(plugin: Plugin, permissions: PermissionService): void { const user = permissions.getCurrentUser(); if (!user) return; const statusBar = plugin.addStatusBarItem(); statusBar.setText(`${user.role.toUpperCase()}`); statusBar.addClass(`role-indicator-${user.role}`); } ``` ## Output - Role-based permission system - Folder-level access control - Protected vault operations - Audit logging - User management UI ## Error Handling | Issue | Cause | Solution | |-------|-------|----------| | Permission denied | Insufficient role | Check role assignment | | User not found | Auth not configured | Set up user management | | Folder access blocked | Team not assigned | Add user to team | | Audit log full | No rotation | Implement log rotation | ## Examples ### Configuration File ```yaml # .obsidian/plugins/my-plugin/rbac-config.yaml enabled: true users: alice: role: admin teams: [management, engineering] bob: role: editor teams: [engineering] charlie: role: viewer teams: [support] teams: - id: management name: Management folders: [management/, projects/] - id: engineering name: Engineering folders: [engineering/, projects/] - id: support name: Support folders: [support/, public/] folderPermissions: - path: public/ allowedRoles: [viewer, editor, contributor, manager, admin] - path: management/ allowedRoles: [manager, admin] allowedTeams: [management] - path: admin/ allowedRoles: [admin] ``` ## Resources - [RBAC Concepts](https://en.wikipedia.org/wiki/Role-based_access_control) - [Obsidian Sync Teams](https://obsidian.md/sync) ## Next Steps For major migrations, see `obsidian-migration-deep-dive`.

Skill file: plugins/saas-packs/obsidian-pack/skills/obsidian-enterprise-rbac/SKILL.md