Replies: 6 comments 12 replies
-
@jmls Pardon for the short reply, I'm currently debugging something... I think this is what namespaces are for in Vault Enterprise (not present in OpenBao): admins can create namespaces and delegate permissions to create policies within the namespace. Then users within the namespace cannot grant permissions outside of that namespace, even to themselves. In general, yes, it is a high privileged operation though. I don't think there's any way to restrict it, within OpenBao at the moment. |
Beta Was this translation helpful? Give feedback.
-
wait, what ... now that you say it, I can see it - I suppose my brain never considered it because that's so ... dumb ... A user with update capabilities to their own account can give themselves admin policies ? Any policy / capability they want ? Isn't that just a potential huge security problem ? I would have thought that assigning policies to an user would always have to have it's own policy ! |
Beta Was this translation helpful? Give feedback.
-
Looking at it, even the actual entity has the same problem /identity/entity/name/:name haws the same issue |
Beta Was this translation helpful? Give feedback.
-
ah, hold on. Can't parameters play a part here ?
|
Beta Was this translation helpful? Give feedback.
-
damn, that namespace feature is more and more compelling ;) |
Beta Was this translation helpful? Give feedback.
-
I'm going to go ahead and close this: #486 was opened which should be the canonical place to discuss namespaces in the future and this has been added to our official roadmap: #569! We're happy to work with anyone interested in adding this feature :-) |
Beta Was this translation helpful? Give feedback.
-
Is there any capability to delegate the creation of policies ?
As an example, let's say that I have the following secret paths
/secrets/data/divisionA/IT
/secrets/data/divisionA/Sales
/secrets/data/divisionB/
and I want users in division A to be able to only create secrets in /secrets/data/divisionA/a/b/c/d/ and set permissions on who can read / write delete those secrets.
At the moment, it seems that only the admin (or user with policy permissions) can create the capabilities on the specified paths. However, if you have this capability of creating policies, don't you then have permissions to create a policy for any path ?
ie without granting full policy access to a user, they cannot create policies on their own paths
I suppose what I'm looking for is the ability to set capabilities for the maintenance of policies on a certain path
Am I explaining this properly ? Has anyone else had a similar scenario and come up with a solution ?
Beta Was this translation helpful? Give feedback.
All reactions