-
-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve default Parse.User security #7292
Comments
Thanks for suggesting. From a security perspective we want to move towards a strict default, so your suggestion to change the default makes sense. As we are moving towards phased depreciation, before this would become a breaking change, the following would need to be implemented:
|
Awesome, thanks for the detailed write up. This will be a good way to show the depreciation policy, considering it will only change a few lines of code. I’ll submit a PR shortly. |
Closed via #7319. On master, if you set |
New Feature / Enhancement Checklist
Current Limitation
By default, when a new user is created, it will have public R, unless overriden by a cloud function.
Feature / Enhancement Description
Currently, to secure users, you need to create a cloud function. In my view, the reverse should be the case - that by default, the Parse.User ACL is R+W false, and if you want the "old" functionality, you should use a cloud function.
The changelog would be:
Breaking Change: Parse.User now defaults to public R false on signup. To achieve public read on sign up, use a cloud trigger:
Alternatives / Workarounds
Create a cloud function to prevent public R access on signup. It's my view this should be reversed - a cloud function shouldn't be needed to secure the user class.
The text was updated successfully, but these errors were encountered: