Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Non-admin users not able to access API Key when the EXTENDED_DATA permission is present #1189

Open
1 task done
IrinaSouth opened this issue Dec 11, 2024 · 2 comments · May be fixed by #1193
Open
1 task done

Non-admin users not able to access API Key when the EXTENDED_DATA permission is present #1189

IrinaSouth opened this issue Dec 11, 2024 · 2 comments · May be fixed by #1193

Comments

@IrinaSouth
Copy link
Contributor

Group users are not able to access their application service account's API Key when the EXTENDED_DATA permission is present. Only org super admins are able to see the keys in this case when it should be available for group users. Conversely, group users can see the API Key just fine when that permission is removed from the service account.

Which area does this issue belong to?

  • FeatureHub Admin Web app
@rvowles
Copy link
Contributor

rvowles commented Dec 22, 2024

This is occurring because the Group has mis-matching permissions. The group needs to match the permissions of the permissions of the service account. If the service account has been given EXTENDED_DATA permissions, the Group has to be as well, you cannot see a service account APi Key that has greater permissions than you yourself do.

The solution is to add the "Extended Data" RoleType into the Groups page and allow groups to have this permission.

rvowles added a commit that referenced this issue Dec 22, 2024
@IrinaSouth
Copy link
Contributor Author

To add to the above comment, a group will require this permission to be assigned because for example extended data can be anything in the data model - not just features, it can export information about environments, applications, portfolios, people attached, their email addresses, etc which regular group user would not have access to unless they are admin.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants