-
Notifications
You must be signed in to change notification settings - Fork 121
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[Feature request] The ability to reuse groups in eligibility policies. #39
Comments
I think that there is another use case. A scenario when one group has an eligibility policy where there is Permission Set A and B, and AWS Account A and B, and I don't want to allow requesting temporary access using Permission Set B with AWS Account A. But only Permission Set A with AWS account A, and Permission Set B with AWS account B. Currently, while being an admin I need to select all possible permission sets and AWS accounts, and requesters can select and mix them in any way which is not safe (approvers can make a mistake during the verification). The only solution is to have more and more user groups but this is not easy when you are using 3rd party provider like Azure AD to manage them, so you cannot simply add new groups in AWS IAM IC. Let me know if that makes sense. |
I think this is a very necessary change to the current model for eligibility. Both the use case of having some accounts with unapproved temporary access, as well as mapping specific permissions sets to specific accounts (and not others) as @rapides mentions. Ideally this would be for both group and individual user eligibility policies but right now I'd settle for this just working for groups. I'd happily look at adding this myself if it's the direction the owners want to take the solution. :) |
@andyt10 This is definitely the direction we are looking at going forward. Would be great if you can take a look at supporting this. |
This is honestly a great offering, and I am so happy someone from AWS has finally looked to fill this void. I think there needs to be some consideration around evaluation logic. The more I think about this, the more important it actually seems to make sure it's 'right' whilst this Solution is in its infancy. From examining this Solution, and reading the points above from yourself and rapides it seems like the following is the desired behaviour
I'm currently evaluating this Solution for use within our Organisation. So far it seems like a great offering, and would potentially replace something we have in-house for most use cases. If this gets the buy-in, I would expect some time directed to making improvements as we need them too. The eligibility evaluation logic and data model seems to be the biggest place for improvement so far. (Slack is desired as well, but I see another PR already for that). |
This comment was marked as outdated.
This comment was marked as outdated.
@tawoyinfa sorry mate, I didn't see your reply or get to that discord link before it expired. |
I am evaluating TEAM right now, and it looks fantastic so far, but I came looking to see if someone else had noted this issue as I can also see it being a problem. It's essentially exactly the scenario that @rapides describes above that will cause the problem, but to provide a named example:
In a similar way, adding to the above scenario:
As noted, it's possible to solve this by adding the Developers to multiple Roles. Whilst possible, when you expand it out to all relevant scenarios, maintaining this would be incredibly difficult. (Unfortunately the approval process cannot be solved this way, even if it's very hard to maintain, and I have added a comment to #81 to describe it.) I am glad that @tawoyinfa has already seen this as the future direction. Thank you. |
Marking this issue as stale due to inactivity. This helps our maintainers find and focus on the active issues. If this issue receives no comments in the next 7 days it will automatically be closed. |
We have deployed this solution (v1.10) and worked with it for a few months now. This feature request is definitely our most wanted! |
Hi @tawoyinfa Can this issue be reopened? I'm really looking forward to this feature. I need/want to setup different permissions. e.g. Assume Role A without approval, but Role B with approval. This is now not possible |
I still see this as a worthwhile enhancement |
Same here, this would definitely be very useful for us! |
Still useful, and would save repetition within the authentication system. |
My knowledge of JS is pretty non-existent. But, it seems to me that the logic of greying out an entity that's already been assigned is controlled in the UI and not by the underlying DynamoDB entry. I've not dug far enough into the rest of the code to see what the impact of removing the filter from the UI would do to downstream logic. But... in 1.1.2's Eligible.js file the users are filtered on line 736 and the groups are filtered on line 765. ``disabled: allItems.map(({ id }) => id).includes(user.UserId), ``disabled: allItems.map(({ id }) => id).includes(group.GroupId), |
Marking this issue as stale due to inactivity. This helps our maintainers find and focus on the active issues. If this issue receives no comments in the next 7 days it will automatically be closed. |
Still useful |
Still useful Current solution is having "Group A" manually/regularly/automatically copied into additional "Group A Pre-Approved", "Group A Prod" (or whatever is relevant for RBAC) within the Identity Provider so that by the time it reaches TEAM it /looks/ like several groups of people. As noted above, this is a messy and hard to maintain solution to a problem that only exists within TEAM. |
This causes a lot of Entra ID overhead, creating multiple groups with essentially the same people in it. |
Still an issue |
Still needed this feature |
At present I believe you can only use the group once. I have two use case - I have a support team i'm happy to give unapproved access to x roles, but for administrative roles, I want an approval. I believe under the current model i can't reference the group twice. The second use case, I have a permissionset with an customer managed policy available to only the Audit account, should be be available to group x. At the same time group x should also be able to assume other roles in the org.
The text was updated successfully, but these errors were encountered: