-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add approval scopes #3559
Comments
I like this proposal it's a good use and example for using |
we don't need |
If I understand this issue, the goal is to scope approval of role escalation to resources that contain a specific tag? Here's an example: I have three teams using Teleport; ops, devs, dbas. devs have the ability to approve access_request from dbas to devs. However, devs should not have the ability to approve an access_request from ops to dbas. Could we simplify this by defining the config via yaml? So in the following case, an additional kind: role
metadata:
name: devs
spec:
options:
# ...
allow:
request:
roles: ['dba']
approve:
roles: ['devs']
# ...
deny:
# ... |
@travelton I think the scope of the issue is slightly different to what you're requesting here. |
dupe of #4749 |
Feature Request
For RBAC in approval workflows, here is a current way to provide user access to grant
access to the access_requests:
Where clause adds ability to limit the scope of approval, but we have to make sure it's supported for this resource in the implementation:
See implementation and tests for where clause here
The text was updated successfully, but these errors were encountered: