I'm considering allowing end users to access their CPEs through the MikroTik Home app to configure their wifi and see connection stats, since it appeared to have its own permissions and limited access (and therefore an inability for them to break things)... However, in testing it seems that even though I've granted the users login group tikapp rights, the app logs in using winbox access. Therefore it seems I have to grant full winbox to users to use the MikroTik Home app, which seems to defeat the whole purpose of the tikapp permission in groups. What am I missing here?
testing this on 6.49.7...
Can anyone suggest a method to allow the android MikroTik Home app (and presumably there's an iOS equivalent?) to login without also granting full winbox access?
This /user group policy that I was expecting to work was this:
policy=reboot,read,write,test,password,web,sniff,tikapp,!local,!telnet,!ssh,!ftp,!policy,!winbox,!sensitive,!api,!romon,!dude
but the logs show the account failed to login via winbox, and as indicated set policy=winbox allowed the user to login. However I do not want to grant full winbox access to the users.
disclaimer, only tried the MikroTik Home app once when it was very first launched, and it didn't recognize PPPoE client setups. haven't opened it again before testing today, so I don't have any real experience with using it.
-Edited to add policy detail