-
Notifications
You must be signed in to change notification settings - Fork 175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enhance SSO User Role Assignment Configuration #1186
Comments
Thanks for the report; we’ll look into it promptly. Don't hesitate to contact us on Discord. |
Hello @steveliem and thank you for reporting this, |
Hello @ab-smith, Thank you for your response. To answer your questions:
Let me know if there's anything further I should verify or adjust in the setup. |
thank you @steveliem , one more thing: are you sure that you are not using the same email address as the initial one on CISO Assistant and assumed it was auto-enrolled? |
Hi @ab-smith, Thank you for the follow-up! Here's what I did to clarify and test the behavior:
Upon reflection, it seems the original issue stemmed from the fact that the email in question had been previously enrolled as the admin user. Even after deleting the admin user, the application appeared to retain a configuration or reference recognizing that email as an admin. This behavior created the initial confusion, but starting fresh with a clean setup resolved the problem entirely. So, to summarize, the current implementation works as expected when starting fresh. Thank you for helping me clarify this process! P.s. I'm having issues with my Discord user. Hopefully it's not an issue for you communicating this way. :-) |
Glad to hear that. Thank you for your reactivity and input, regardless of the channel. We really appreciate your feedback, as these topics are a top priority for our design and implementation. The user management is persistent at the db level indeed, and access is challenged for each request actually, could be some caching at the browser level. I'll close this ticket, and I'll create an enhancement one to keep track of the requests regarding the auto-enrollment topic that we will tackle middle of next year. In the meantime, I'll take a look at the helm chart topic you've raised on the other repo, as this one is probably more impactful in the short term. Warm regards, |
Problem Statement
Currently, when deploying CISO Assistant on OpenShift with Keycloak configured for Single Sign-On (SSO), the application automatically assigns the admin role to new users upon their first SSO login. This behavior poses a security risk, as any user with SSO access can inadvertently gain administrative privileges. Conversely, if an admin pre-creates a user in CISO Assistant and assigns them to a specific group, the user receives the correct permissions upon first SSO login. However, this manual process is not scalable and lacks flexibility.
Expected Behavior
Mock
Not applicable.
Additional Context
Implementing this feature enhances security by preventing unauthorized users from gaining administrative access through SSO. It also streamlines user management by allowing administrators to define default roles for new SSO users and manage access approvals efficiently. This approach aligns with Role-Based Access Control (RBAC) best practices, ensuring that users have appropriate permissions based on their roles.
The text was updated successfully, but these errors were encountered: