Permission to only Edit Pages (not books) for Selected Users #4500

Closed
opened 2026-02-05 09:01:37 +03:00 by OVERLORD · 5 comments
Owner

Originally created by @mgmwhite on GitHub (Mar 7, 2024).

Attempted Debugging

  • I have read the debugging page

Searched GitHub Issues

  • I have searched GitHub for the issue.

Describe the Scenario

Hi all,
is it somehow possible to enable a group of users to create and edit pages/chapters but not the containig book itself without having to micromanage every new page that gets created?

So basically have group "Admins" create new books, that group "editors" are only allowed to fill with content and a group "viewers" that can only read the content.

I tried different setups but either the Editors could edit both pages/chapters and books or neither of them.
Would be great to know if this is somehow achievable.

Thanks!

PS: Same thing goes for being able to create and edit books but not the containig shelf, so one level "higher". Could not figure out how to do that either.

Exact BookStack Version

v24.02

Log Content

No response

Hosting Environment

.

Originally created by @mgmwhite on GitHub (Mar 7, 2024). ### Attempted Debugging - [X] I have read the debugging page ### Searched GitHub Issues - [X] I have searched GitHub for the issue. ### Describe the Scenario Hi all, is it somehow possible to enable a group of users to create and edit pages/chapters but not the containig book itself without having to micromanage every new page that gets created? So basically have group "Admins" create new books, that group "editors" are only allowed to fill with content and a group "viewers" that can only read the content. I tried different setups but either the Editors could edit both pages/chapters **and** books or neither of them. Would be great to know if this is somehow achievable. Thanks! PS: Same thing goes for being able to create and edit books but not the containig shelf, so one level "higher". Could not figure out how to do that either. ### Exact BookStack Version v24.02 ### Log Content _No response_ ### Hosting Environment .
OVERLORD added the 🐕 Support label 2026-02-05 09:01:37 +03:00
Author
Owner

@ssddanbrown commented on GitHub (Mar 7, 2024):

Hi @mgmwhite,
You can do this via role permissions, since you can manage those per-content type, but as soon as you start applying permissions to specific items things can become more micro-managey for what you want, since permissions will cascade (from books and chapters).

@ssddanbrown commented on GitHub (Mar 7, 2024): Hi @mgmwhite, You can do this via role permissions, since you can manage those per-content type, but as soon as you start applying permissions to specific items things can become more micro-managey for what you want, since permissions will cascade (from books and chapters).
Author
Owner

@mgmwhite commented on GitHub (Mar 11, 2024):

Hi @ssddanbrown
thanks for replying! I tried a few different settings, but none of them really met the requirement. I think to simply map the process, there would need to be an additional boolean field in the book permissions, maybe called "Update Content" or something like that. If this is set, the user should only be able to edit the content of a book, but not the book itself. This would be great, for example, to allow individual users to use books to publish stuff without "jeopardising" the established book infrastructure.
What do you think about this?

@mgmwhite commented on GitHub (Mar 11, 2024): Hi @ssddanbrown thanks for replying! I tried a few different settings, but none of them really met the requirement. I think to simply map the process, there would need to be an additional boolean field in the book permissions, maybe called "Update Content" or something like that. If this is set, the user should only be able to edit the content of a book, but not the book itself. This would be great, for example, to allow individual users to use books to publish stuff without "jeopardising" the established book infrastructure. What do you think about this?
Author
Owner

@ssddanbrown commented on GitHub (Mar 11, 2024):

@mgmwhite I can see how that would help, and why you might want that option.

Personally though I don't want to add additional complexity to the permission system so I'd not be keen to add this without significant demand, of which we have not observed so far.

Another potential option for this could be via the request in #4832, for roles to become owners.
There's also some prior discussion related to that in #3964.

@ssddanbrown commented on GitHub (Mar 11, 2024): @mgmwhite I can see how that would help, and why you might want that option. Personally though I don't want to add additional complexity to the permission system so I'd not be keen to add this without significant demand, of which we have not observed so far. Another potential option for this could be via the request in #4832, for roles to become owners. There's also some prior discussion related to that in #3964.
Author
Owner

@Valaron-Jakob commented on GitHub (May 10, 2025):

To be able to differenciate in permission between the parent and child items would be well appreciated for us as well.

Our UseCases:

  • Allowing users to collaborate inside a book creating their own pages without being able to edit or remove those of other users.
  • Have a couple of these collaboration spaces inside different books for different groups.
  • Maintaining the "least privileges" priciple, only giving access to specific shelves/books/pages that are ready to be released. Keeping everything else internal. (Allowing normal users to do nothing, except inside specific books/shelves - not the other way around)

Some Examples:

  • GMs posting resources, concepts and good practices in a specific area
  • Players posting city descriptions and event-notifications
  • Books for different guilds that are managed by the administrators but can be filled by the guild

Proposed Solutions:
"Create" permissions already only affects the contet, whereas "Update" and "Delete" allow to delete the book/shelf. Allowing to be able to differenciate between them would be gamechanging for us.

Solution I - Individual Book & Content permission overrides
Image

Solution II - Dropdowns for granular Create & Delete perission overrides
Image

Thank you for reading and considering this

@Valaron-Jakob commented on GitHub (May 10, 2025): To be able to differenciate in permission between the parent and child items would be well appreciated for us as well. **Our UseCases**: - Allowing users to collaborate inside a book creating their own pages without being able to edit or remove those of other users. - Have a couple of these collaboration spaces inside different books for different groups. - Maintaining the "least privileges" priciple, only giving access to specific shelves/books/pages that are ready to be released. Keeping everything else internal. (Allowing normal users to do nothing, except inside specific books/shelves - not the other way around) **Some Examples**: - GMs posting resources, concepts and good practices in a specific area - Players posting city descriptions and event-notifications - Books for different guilds that are managed by the administrators but can be filled by the guild **Proposed Solutions**: "Create" permissions already only affects the contet, whereas "Update" and "Delete" allow to delete the book/shelf. Allowing to be able to differenciate between them would be gamechanging for us. Solution I - Individual Book & Content permission overrides ![Image](https://github.com/user-attachments/assets/d22b9425-e358-470b-8d6d-ef5e4ae3ce30) Solution II - Dropdowns for granular Create & Delete perission overrides ![Image](https://github.com/user-attachments/assets/f405bc36-fb51-4aea-9a29-640d597a9736) Thank you for reading and considering this
Author
Owner

@ssddanbrown commented on GitHub (Sep 3, 2025):

Since this support request is quite old, I'm going to close this off.

@ssddanbrown commented on GitHub (Sep 3, 2025): Since this support request is quite old, I'm going to close this off.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/BookStack#4500