Replies: 3 comments 3 replies
-
What does this mean in practice? That you cannot restrict e.g. product access to only some members of the organization anymore? |
Beta Was this translation helpful? Give feedback.
-
IIUC, while we do have roles on those three levels, the roles are however currently inherited top-down, which renders the levels useless as they are now. If a user is given a READ access to an organization, he/she has READ access for all products, and all repositories of the said products, right? At least that's what it was some months ago when I reviewed this last time. If I am correct with the above, and if we want to manage access rights on all levels, this implicit inheritance of the access rights needs to be changed, in order to for example only give access rights to a user for some products in an organization, or just for some repositories in a product etc. But maybe this is exactly what you're trying to change now, @wkl3nk, by implementing managing the user rights independently on all levels? |
Beta Was this translation helpful? Give feedback.
-
I disagree with these statements.
While true, these are implementation details, so users shouldn't care about them and these arguments shouldn't be the main motivator for designing a permission system.
Changing a permission system at a later point seems nearly impossible. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Currently, user roles are defined on these (entity) levels:
IMO, this is unnecessarily complicated:
Alternative: Only have user roles on Organization level.
Agile approach: I claim, this is good enough for 95% of our future users. Get rid of the roles on product and repository level.
Beta Was this translation helpful? Give feedback.
All reactions