Collection permissioning in R2R is still under development and as a result the API will likely evolve.
Collection creation and Management
Create a Collection
Create a new collection with a name and optional description:Response
Response
Get Collection details
Retrieve details about a specific collection:Response
Response
Update a Collection
Update a collection’s name or description:Response
Response
List Collections
Get a list of all collections:Response
Response
User Management in Collections
Add User to Collection
Add a user to a collection:Response
Response
Remove User from Collection
Remove a user from a collection:Response
Response
List Users in Collection
Get a list of all users in a specific collection:Response
Response
Get User’s Collections
Get all collections that a user is a member of:Response
Response
Document Management in Collections
Assign Document to Collection
Assign a document to a collection:Response
Response
Remove Document from Collection
Remove a document from a collection:Response
Response
List Documents in Collection
Get a list of all documents in a specific collection:Response
Response
Get Document’s Collections
Get all collections that a document is assigned to:Response
Response
Advanced Collection Management
Collection Overview
Get an overview of collections, including user and document counts:Response
Response
Delete a Collection
Delete a collection:Response
Response
Pagination and Filtering
Many collection-related methods support pagination and filtering:Security Considerations
When implementing collection permissions, consider the following security best practices:- Always use HTTPS in production to encrypt data in transit.
- Implement the principle of least privilege by assigning the minimum necessary permissions to users and collections.
- Regularly audit collection memberships and document assignments.
- Ensure that only authorized users (e.g., admins) can perform collection management operations.
- Implement comprehensive logging for all collection-related actions.
- Consider implementing additional access controls or custom roles within your application logic for more fine-grained permissions.