Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Auth for Admins/God inconsistent #687

Closed
fabiankirstein opened this issue Oct 9, 2016 · 7 comments
Closed

Auth for Admins/God inconsistent #687

fabiankirstein opened this issue Oct 9, 2016 · 7 comments

Comments

@fabiankirstein
Copy link
Member

@slomo I just want some clarification who the admin authorization is working now. Is it "god"? Is it "admin". On Alpha it is not working at the moment.

@mohammedbahja I have the feeling that FCMs can be edited by everybody. Can you please check?

@mohammedbahja
Copy link

@FabiApfelkern I have tested, and canot be edited by others. Just the creators can edit their won FCMs

@fabiankirstein
Copy link
Member Author

@mohammedbahja On which server have you tested it?

@slomo
Copy link
Contributor

slomo commented Oct 10, 2016

Currently we consider all users to be admin, that have the role admin assigned. On stage those are all users you gave me earlier. On prod there are probably no users with that role.

@fabiankirstein
Copy link
Member Author

So this needs to reflected then in A3 on the Alpha server? And I guess FCM does not have it in the backend yet?

@mohammedbahja
Copy link

@FabiApfelkern I tested the production. Please see the image below. This is for the scenario when a user tries to edit other users models.
1

@fabiankirstein
Copy link
Member Author

Ok. Thanks!

@slomo
Copy link
Contributor

slomo commented Oct 10, 2016

I fixed this for fcm and update uses on all deployments policycompass/policycompass-fcmmanager#47

@slomo slomo closed this as completed Oct 10, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants