I would like to achieve the following with OpenSSH's internal-sftp, chroot and Match directive:
Users belonging to group sftpuser should have read and write access to /srv/sftp/{username} (or similar, certain tricks to present a nicer looking directory structure to the chrooted user might be taken)
Users belonging to group sftpadmin should have read and write access to /srv/sftp and subdirectories, i.e. all the other user directories.
All the users belonging to either sftpadmin or sftpuser are sftp-only users. So no need to worry about shells etc.
/srv/sftp needs to be owned by root for the sftpadmin users to be chrooted to that folder. /srv/sftp/{username} also needs to be owned by root to chroot the sftpuser users to that that folder.
How should I best grant the sftpadmin users access to the root owned /srv/sftp/{username} directories?
Could I just use ACL on top of the root permissions?