Sorry, accidentally deleted my last post:
Just thought I’d post here as I’ve been trying to get my instance configured with the ‘Strict’ security model for some time, unfortunately there’s been a few issues I’ve been waiting on resolution which now seem to all be good since the release of 5.6.8.
Let me preface by saying, previous orgs I’ve been part of a dedicated automation team, owned the solution and typically only the people in our team had access to it and there was no need for any granularity or ‘roles’ it was just if you had access and wanted to develop on the platform you had full admin access.
My current org, things are different, I’ve introduced this platform, but there’s no dedicated team to own automations, and instead i’ll be looking to bring other teams into the fold.
The challenge here is security.
Different automations and integrations have access to different things, and not everyone should see everything.
Most of that is addressed with the new ‘Strict’ mode in v5, being able to set role based permissions at the script level and various components of the admin menu is a HUGE improvement, as well as on apps and the portal etc.
However, I’m struggling with the following:
-
Schedules
-
Triggers
-
PSU internal commands
-
Running jobs on different nodes (this one is particularly frustrating as I have a web node and job node so my users will be coming into ServerA admin portal, but always running jobs against ServerB, all jobs with any PSU commands will fail due to this, even if the user has the correct permissions. If i test against server A they work fine).
For the first two, they do not inherit any sort of permissions so if you set a role on a variable, it can’t access it and internal PSU cmds do not work, things like Get-PSUJob or Invoke-PSUScript, which I use frequently.
Couple of examples that stopped working when I switched to Strict mode:
-
A job that runs on a trigger (failure of any script) and calls get-PSUJob (because there’s missing metadata in $job), it then creates and sends an email notification to relevant users of that automation.
-
Any Schedules that run scripts where the script completes, but the last step is to Invoke-PSUScript on another script directly after.
-
I tried to change the above instead to a Trigger method, but triggers cannot have paramters it seems and they also dont fire when configured on the job completion of a specific script (open bug for this).
-
Pass through authentication, if I choose “Run job on all nodes” and that job has any PSU commands, it only works on the current node, presumably because it’s not handing my permissions/authentication to the second node
Typically the failures above just throw the standard gRPC errors you see when there’s some sort of permission problem.
Other discussions I’ve seen on this involved people putting a PSU token into a non secret variable so it can be accessed by the schedule, though this sort of defeats the purpose of strict mode in the first place and anyone can get access to that variable since it wouldnt have roles either.
I wanted to reach out to all of you and understand how everyone else is using or configuring their instances in strict mode?
