-
Notifications
You must be signed in to change notification settings - Fork 319
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
how does one prevent certs from being shown to certain users? #609
Comments
Roles are membership based. For example you have two users: Alice and Bob. Alice is an admin and has the Bob is just an operator, by default he can't actually do anything. If we want Bob to be able to issue certificates from a given authority we assign the However if a third user Charlie; another operator; tries to view the private key of the certificate Bob just created we will not be allow. He will however be able to view the public key of the certificate Bob created. Public keys are not considered private as they have to be available for PKI to function. |
So I understand that. Is there a way to not show certs to Charlie when he is not part of any roles assigned to them? thanks |
Charlie will not be able to view private key material but will still be able to view all public material. There is no current way to restrict Charlie of view the public parts of a certificate. There is however, #22 which would give you a view where a user would only see the certificates they own specifically. |
#22 sounds like what I want. I will track that request. thanks |
Hi,
I have a fresh install with two users. One user has admin and operator roles while the second user has no roles. Now if I create a cert with the first user and assign admin role to it the second user can still see/view it. Is my understanding of roles incorrect? I thought that by assigning roles to certs it would show hide it to the logged in user.
thanks
The text was updated successfully, but these errors were encountered: