This is an automated email from the ASF dual-hosted git repository.

sureshanaparti pushed a commit to branch 4.16
in repository https://gitbox.apache.org/repos/asf/cloudstack-documentation.git


The following commit(s) were added to refs/heads/4.16 by this push:
     new 4b0d6f6  note on dynamic roles caveat (#260)
4b0d6f6 is described below

commit 4b0d6f6f057b0bbcedd4861b429daeb383985177
Author: dahn <[email protected]>
AuthorDate: Thu Feb 10 07:26:00 2022 +0100

    note on dynamic roles caveat (#260)
    
    * note on dynamic roles caveat
    
    * Apply suggestions from code review
    
    * saveguard implementation note added
    
    Co-authored-by: sureshanaparti 
<[email protected]>
    
    Co-authored-by: Daan Hoogland <[email protected]>
---
 source/adminguide/accounts.rst | 16 ++++++++++++++++
 1 file changed, 16 insertions(+)

diff --git a/source/adminguide/accounts.rst b/source/adminguide/accounts.rst
index a7e699a..093332d 100644
--- a/source/adminguide/accounts.rst
+++ b/source/adminguide/accounts.rst
@@ -135,6 +135,22 @@ allows CloudStack root admins to create new roles with 
customized permissions.
 The allow/deny rules can be configured dynamically during runtime without
 restarting the management server(s).
 
+.. Note:: in versions before 4.16.1, any user given the custom roles
+          that include permission to create and/or update accounts
+          will have the ability to assign new custom roles to
+          themsevles or other users, irrespective of the privileges
+          given in those roles. This could allow such a user to
+          escalate their own privileges to include any API they might
+          not have had before. Therefore, the dynamic roles should be
+          carefully designed and the `createAccount` and
+          `updateAccount` privileges should only be given to users who
+          you are content to have this level of privilege.
+
+          Since 4.16.1 a user will be prevented to create an account
+          with a role that has any permissions that they do not have
+          themselves. This check will also be performed, since that
+          version, on updating an account-role.
+
 For backward compatiblity, all roles resolve to one of the four role types:
 admin, resource admin, domain admin and user. A new role can be created using
 the roles tab in the UI and specifying a name, either a role type or ID of 
existing

Reply via email to