-
Notifications
You must be signed in to change notification settings - Fork 411
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WIP: More granular feature level permissions #1535
Comments
Some thoughts based on a conversation with @gagantrivedi .
Next steps: start implementing option (2) above and see where it gets us :) |
Yep agree - leveraging roles seems the right path here |
I will set up some time with @novakzaballa to go through the backend implementation done here: 78e559c |
Since there is not too much information about the behavior of this feature in the final implementation, I have the following assumptions:
Since these points are not met, I created the following issues. |
As discussed on a call with @gagantrivedi , @novakzaballa and @kyle-ssg we have decided on a few outcomes:
Another topic was discussed was around the security of tag-based permissions. The issue arises due to the fact that anyone with the
|
I believe this can be closed |
Overview
Where larger teams are working on a single Flagsmith Project, it would be useful for them to be able to assign RBAC privieldges based on a subset of Flags within the Project.
Potential Solution
The current proposed solution involves leveraging the tags that already exist within the platform. We would add the ability, when modifying the permissions for a group in an environment, to add a subset of tags that that permission / those permissions apply to. For example, you may have a group of users that should only have the 'Update feature state' permission against a subset of tags. One UI option to illustrate this is to add the ability to add tags below each permission, as per the following screenshot.
Detailed Example
TBC
Issues/Open Questions
Other Possible Approaches
Environment / Feature Combination Level Permissions
The tags approach makes the management of the permissions slightly simpler, however, it may not be the best solution for creating the most granular permissions. Another option here would be to allow admins to create permissions for groups (& users?) against a combination of a feature and an environment. The UI management of these permissions would be challenging but it would likely allow admins to create more granular permissions as needed.
The text was updated successfully, but these errors were encountered: