Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

UI Permissions #2756

Open
1 task done
piclemx opened this issue Feb 9, 2024 · 4 comments
Open
1 task done

UI Permissions #2756

piclemx opened this issue Feb 9, 2024 · 4 comments
Labels
enhancement Created by Linear-GitHub Sync xl As big as it gets

Comments

@piclemx
Copy link

piclemx commented Feb 9, 2024

Problem

Current, every user after login seems to have access to each namespace.

It would have been interesting to have a way to segregate access of users base on something.

Ideal Solution

  • Ability to map a user to a given namespace
  • Ability to give read/write permission to a given namespace

Search

  • I searched for other open and closed issues before opening this

Additional Context

No response

@piclemx piclemx added the enhancement Created by Linear-GitHub Sync label Feb 9, 2024
@markphelps
Copy link
Collaborator

What if we added support for Open Policy evaluation in Flipt. This would allow orgs to define their own policies to fit their needs and we could pull them in during runtime. We could have some pre-configured (RBAC) policies potentially built into Flipt itself. We would need to figure out how to map authenticated users with these policies though

@piclemx
Copy link
Author

piclemx commented Mar 5, 2024

What if we added support for Open Policy evaluation in Flipt. This would allow orgs to define their own policies to fit their needs and we could pull them in during runtime. We could have some pre-configured (RBAC) policies potentially built into Flipt itself. We would need to figure out how to map authenticated users with these policies though

So we would need to deploy our own OPA?

@markphelps
Copy link
Collaborator

markphelps commented Mar 5, 2024

No they expose a library that is written in go so we can evaluate the policies in Flipt. No extra services needed.

We will need to figure out a nice way to allow users to configure their own policies that can be loaded at startup and map them to some standard roles that we define (I think). Also rego may be a non starter for some as it's got a bit of a learning curve, but would love to hear your thoughts

@piclemx
Copy link
Author

piclemx commented Mar 6, 2024

I loved the idea.

@markphelps markphelps added the xl As big as it gets label Mar 16, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Created by Linear-GitHub Sync xl As big as it gets
Projects
Status: No status
Development

No branches or pull requests

2 participants