You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As policy and the platform have matured, review and re-assess whether this is appropriate for the following policy objects, or if more or less privilege is required:
Subject Mappings
Subject Condition Sets
GetAttributesByValueFqns
KAS Grants (which are needed on encrypt and therefore must be widely available)
KAS Registry
Resource Mappings
Acceptance Criteria
read privileges are considered in light of the needs for various encrypt/decrypt flows
read privileges remain for admins and org-admins
defaultPolicy is updated if needed
decisioning around the above is documented in this issue
The text was updated successfully, but these errors were encountered:
Related to #1559
Policy read is currently wide open to the
standard
role in Casbin policy which means any authenticated user:platform/service/internal/auth/casbin.go
Lines 89 to 97 in 7dc0b91
As policy and the platform have matured, review and re-assess whether this is appropriate for the following policy objects, or if more or less privilege is required:
Acceptance Criteria
The text was updated successfully, but these errors were encountered: