Hi,
We are building a generic Structure so that every project in our organization can access the data pertaining to their project according to their permissions within that Structure.
For example, the Structure search for all issue of type Risk and show only the issue for which the user has access to the project.
Structure seems to be applying the permissions of the owner of the Structure on top of the permission for the user of the Structure. Thus limiting what the user can see to what the owner has access.
For example, if the owner has access to project 1, 2 and 3 and user has access to project 4, 5 and 6. The user won’t see anything in the Structure.
How can this behavior of Structure can be avoided ?
We have a hard time understanding why Structure apply a permission validation based on the owner of the Structure when there’s already a validation within Structure based on the permissions of the users.
Hi @David Landry ,
As you've mentioned, Structure currently applies the permissions of the owner of the Structure on top of the permission for the user of the Structure. This behaviour can be confusing and limiting in some cases, but unfortunately, there's no direct way to avoid this behaviour in the Structure app itself.
This way, you can ensure that the Structure owner has access to all projects, and other users can see the issues they have access to without being limited by the owner's permissions.
Remember that giving the dedicated user account access to all projects might have some security implications, so evaluate this workaround carefully based on your organization's requirements and policies.
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.