This BZ is aimed at implementing part of https://issues.jboss.org/browse/PRODMGT-87 The idea is that users without specific priviliges should not be able to see detailed information about other users in the system. There seem to be two options 1) Require MANAGE_SECURITY (or MANAGE_USERS) permissions for users to see any details beyond usernames. w/o MANAGE_SECURITY users going to localhost:7080/coregui/#Administration/Security/Users would just see a list of usernames and only their own link should be clickable. Similarly if there are sections of the app that display usernames they should not be clickable to show any more information about the user unless the clicking user has MANAGE_SECURITY permission. A user with MANAGE_SECURITY permissions would see what all users see today wrt user information. or 2) Add in a new permission, e.g. VIEW_USER_DETAILS, that when enabled would allow users the access they have today, i.e. can view detailed information on all users. A user without this new permission, would get the restricted view described in 1) above.
Ian, please discuss your intended approach on rhq-devel
This is done in master: http://git.fedorahosted.org/git/?p=rhq/rhq.git;a=commitdiff;h=e2bbfdf I added a new global perm named VIEW_USERS, which is required in order to view other RHQ users. Enforcement of the permission is implemented at the SLSB layer (in SubjectManagerBean). For backward compatibility sake, dbsetup gives existing roles the new permission, and the create new role view in the GUI selects the checkbox for the VIEW_USERS perm by default.
http://git.fedorahosted.org/git/?p=rhq/rhq.git;a=commitdiff;h=fd854c8 adds functional tests for this feature. I still need to write tests that verify the VIEW_USERS permission gets added to existing roles by dbupgrade.
The dbsetup/dbupgrade test have been added in master: http://git.fedorahosted.org/git/?p=rhq/rhq.git;a=commitdiff;h=5371524
Documenting the acceptance criteria for this BZ, as follows: Acceptance Criteria: -Users in roles without the new VIEW_USER_DETAILS permission will not be able to see any JON user information in the system beyond usernames -Users in roles with the new VIEW_USER_DETAILS permission will be able to see JON user information across the system just as the do today. -In upgraded systems all old roles will have the VIEW_USER_DETAILS permission, so there will be no change in behaviour for existing users
added TCMS testcase as follows: https://tcms.engineering.redhat.com/case/146315/?from_plan=5753
verified
Bulk closing of old issues in VERIFIED state.