Open anvabr opened 5 months ago
So I can understand the context further why is this needed at the Guardian level, and why not at a application level that decides the users that into a given system?
And more specifically, for particular users:
A traditional project developer (supplier) role with a particular policy enables the same consumption of a token with different projects, why is it needed to limit this group of users?
Currently, this only ends in the issuance of the same token, and can be circumvented through cloning a policy.
I suppose that point two would be useful, and currently the work around would either have 2 options (both managed from an external system):
These assumptions are using Guardian through an API where security concerns are solved with IP whitelisting, holistically how much control should the Guardian have?
Problem description
In the course of #2844 Guardian user roles and permission model has undergone a significant revamp. This tickeet addressed management of user permissions/capabilities when it comes to accessing policies. However, within the policies user permissions and roles are determined by the policies themselves. Current in-policy roles&rules definition capabilities have been found to be not sufficient for some of the identified use-cases. This ticket serves as a placeholder to collect such use-cases (in the "Requirements" section below), to inform the developers so appropriate enhancements to roles&rules functionality can be made.
Requirements
Enhance the in-policy roles&rules functionality such that the following use-cases become possible:
Definition of done
Acceptance criteria
Users are able to configure their in-policy user roles and rules of their authorisation and activity such that any (and all) of the use-cases in the Requirements section are covered.