@@ -197,7 +197,27 @@ <h2><a id="7.Direct-web-access">Direct web access to files</a></h2>
197
197
this way (there is an exception for that). We believe that these resources
198
198
do not contain confidential information. If you *DO* have confidential
199
199
information in images, CSS or JavaScript files, you will need to update
200
- these rules to suit your needs.
200
+ these rules to suit your needs.< br />
201
+ < br />
202
+ < h3 > Access to "personal" files</ h3 >
203
+ In Chamilo 1.*, it is possible to upload files to one's "personal" folder
204
+ through the social network page, or through any upload popup that allows
205
+ you to choose the file destination (and you select your personal folder).< br />
206
+ < br />
207
+ Due to the development background in Chamilo, these files are then directly
208
+ accessible by anonymous users, which can lead to personal data leaks. This
209
+ has been left in this mode by default because many teacher users had used
210
+ this option to share common images between different courses and blocking
211
+ the feature would have meant public courses would not have shown the given
212
+ images.< br />
213
+ < br />
214
+ To avoid this issue and make files accessible *only* to authenticated users,
215
+ please set the following option to 'true' in configuration.php:< br />
216
+ < br />
217
+ < pre >
218
+ $_configuration['block_my_files_access'] = true;</ pre >
219
+ This will prevent anonymous access, but will not prevent access from other
220
+ authenticated users.
201
221
</ p >
202
222
203
223
< h2 > < a id ="8.Disable-webservices "> Disable webservices</ a > </ h2 >
0 commit comments