Setting Up Permissions

Gdam can be run in many modes, the best one for you depends on how you want to use it.

If gdam works for you "out of the box" there is probably little reason to configure it to behave more securely, although we recommend always running gdam-server behind a firewall. (We have designed it to be secure in many sensible ways - but there is a lot of auditting to do. Currently, lack of strong authentication is the biggest problem.)

If you wish to run gdam realtime you will have to run it as root. This is also a situation you must consider if you run gdam-server from an initscript.

If you add Username and Group tags to the configuration file and run it as root, gdam-server drops to that identity before opening the audio devices. This means that the user or group must have unix permission to open sound devices. Either

  1. the audio device must be owned and writable by the specified Username.

  2. the audio device must be owned and writable by the specified Group.

If you don't know what to do, we recommend making your audio devices readable and writable by a group "audio" (which you may have to create using the addgroup or groupadd or by editting /etc/group directly. This boils down to:
    % addgroup audio          
    	    # may complain if the group exists.
    % chgrp audio /dev/dsp*   
    % chmod 660 /dev/dsp*
	    # alsa users should add /dev/snd/pcm*