Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Restrict Admin and Super Users from Changing Their Own Security Groups #169

Open
Adameddy26 opened this issue Mar 13, 2024 · 1 comment
Open
Labels
enhancement New feature or request

Comments

@Adameddy26
Copy link

What is the motivation for adding/enhancing this feature?

To improve security and prevent unintended access issues. By restricting admin and super users from changing their own security groups, we can reduce the risk of unauthorized access and maintain better control over user permissions. This helps prevent accidental changes that could lead to users losing access to the application or gaining access they shouldn't have. Overall, it helps ensure a more secure and stable environment for our users.

What are the acceptance criteria?

Admin and super users should be prevented from changing their own security groups.
If a user's security group is changed by an administrator, their permissions should be automatically updated to reflect the permissions associated with the new security group.
Attempting to change one's own security group should result in a clear error message informing the user of the restriction and guiding them on next steps.
Log any attempts to change security groups, including unsuccessful attempts due to the restriction on self-modification, for accountability and tracking purposes.

@Adameddy26 Adameddy26 added the enhancement New feature or request label Mar 13, 2024
@Adameddy26 Adameddy26 moved this to 📋 Backlog in Digital Experience Platform Mar 13, 2024
@ravilodhi ravilodhi moved this from 📋 Backlog to 📅 Planned in Digital Experience Platform Mar 15, 2024
@dt2patel
Copy link
Contributor

dt2patel commented Dec 6, 2024

Moving to backlog because I'm not convinced this should be modeled like this. @ravilodhi if you have a permission driven model in mind to execute this please share and we can plan this ticket.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
Status: 📅 Planned
Development

No branches or pull requests

2 participants