mirror of
https://github.com/netbox-community/netbox.git
synced 2026-01-11 21:10:29 +01:00
No Branch/Tag Specified
main
update-changelog-comments-docs
feature-removal-issue-type
20911-dropdown
20239-plugin-menu-classes-mutable-state
21097-graphql-id-lookups
feature
fix_module_substitution
20923-dcim-templates
20044-elevation-stuck-lightmode
feature-ip-prefix-link
v4.5-beta1-release
20068-import-moduletype-attrs
20766-fix-german-translation-code-literals
20378-del-script
7604-filter-modifiers-v3
circuit-swap
12318-case-insensitive-uniqueness
20637-improve-device-q-filter
20660-script-load
19724-graphql
20614-update-ruff
14884-script
02496-max-page
19720-macaddress-interface-generic-relation
19408-circuit-terminations-export-templates
20203-openapi-check
fix-19669-api-image-download
7604-filter-modifiers
19275-fixes-interface-bulk-edit
fix-17794-get_field_value_return_list
11507-show-aggregate-and-rir-on-api
9583-add_column_specific_search_field_to_tables
v4.5.0
v4.4.10
v4.4.9
v4.5.0-beta1
v4.4.8
v4.4.7
v4.4.6
v4.4.5
v4.4.4
v4.4.3
v4.4.2
v4.4.1
v4.4.0
v4.3.7
v4.4.0-beta1
v4.3.6
v4.3.5
v4.3.4
v4.3.3
v4.3.2
v4.3.1
v4.3.0
v4.2.9
v4.3.0-beta2
v4.2.8
v4.3.0-beta1
v4.2.7
v4.2.6
v4.2.5
v4.2.4
v4.2.3
v4.2.2
v4.2.1
v4.2.0
v4.1.11
v4.1.10
v4.1.9
v4.1.8
v4.2-beta1
v4.1.7
v4.1.6
v4.1.5
v4.1.4
v4.1.3
v4.1.2
v4.1.1
v4.1.0
v4.0.11
v4.0.10
v4.0.9
v4.1-beta1
v4.0.8
v4.0.7
v4.0.6
v4.0.5
v4.0.3
v4.0.2
v4.0.1
v4.0.0
v3.7.8
v3.7.7
v4.0-beta2
v3.7.6
v3.7.5
v4.0-beta1
v3.7.4
v3.7.3
v3.7.2
v3.7.1
v3.7.0
v3.6.9
v3.6.8
v3.6.7
v3.7-beta1
v3.6.6
v3.6.5
v3.6.4
v3.6.3
v3.6.2
v3.6.1
v3.6.0
v3.5.9
v3.6-beta2
v3.5.8
v3.6-beta1
v3.5.7
v3.5.6
v3.5.5
v3.5.4
v3.5.3
v3.5.2
v3.5.1
v3.5.0
v3.4.10
v3.4.9
v3.5-beta2
v3.4.8
v3.5-beta1
v3.4.7
v3.4.6
v3.4.5
v3.4.4
v3.4.3
v3.4.2
v3.4.1
v3.4.0
v3.3.10
v3.3.9
v3.4-beta1
v3.3.8
v3.3.7
v3.3.6
v3.3.5
v3.3.4
v3.3.3
v3.3.2
v3.3.1
v3.3.0
v3.2.9
v3.2.8
v3.3-beta2
v3.2.7
v3.3-beta1
v3.2.6
v3.2.5
v3.2.4
v3.2.3
v3.2.2
v3.2.1
v3.2.0
v3.1.11
v3.1.10
v3.2-beta2
v3.1.9
v3.2-beta1
v3.1.8
v3.1.7
v3.1.6
v3.1.5
v3.1.4
v3.1.3
v3.1.2
v3.1.1
v3.1.0
v3.0.12
v3.0.11
v3.0.10
v3.1-beta1
v3.0.9
v3.0.8
v3.0.7
v3.0.6
v3.0.5
v3.0.4
v3.0.3
v3.0.2
v3.0.1
v3.0.0
v2.11.12
v3.0-beta2
v2.11.11
v2.11.10
v3.0-beta1
v2.11.9
v2.11.8
v2.11.7
v2.11.6
v2.11.5
v2.11.4
v2.11.3
v2.11.2
v2.11.1
v2.11.0
v2.10.10
v2.10.9
v2.11-beta1
v2.10.8
v2.10.7
v2.10.6
v2.10.5
v2.10.4
v2.10.3
v2.10.2
v2.10.1
v2.10.0
v2.9.11
v2.10-beta2
v2.9.10
v2.10-beta1
v2.9.9
v2.9.8
v2.9.7
v2.9.6
v2.9.5
v2.9.4
v2.9.3
v2.9.2
v2.9.1
v2.9.0
v2.9-beta2
v2.8.9
v2.9-beta1
v2.8.8
v2.8.7
v2.8.6
v2.8.5
v2.8.4
v2.8.3
v2.8.2
v2.8.1
v2.8.0
v2.7.12
v2.7.11
v2.7.10
v2.7.9
v2.7.8
v2.7.7
v2.7.6
v2.7.5
v2.7.4
v2.7.3
v2.7.2
v2.7.1
v2.7.0
v2.6.12
v2.6.11
v2.6.10
v2.6.9
v2.7-beta1
Solcon-2020-01-06
v2.6.8
v2.6.7
v2.6.6
v2.6.5
v2.6.4
v2.6.3
v2.6.2
v2.6.1
v2.6.0
v2.5.13
v2.5.12
v2.6-beta1
v2.5.11
v2.5.10
v2.5.9
v2.5.8
v2.5.7
v2.5.6
v2.5.5
v2.5.4
v2.5.3
v2.5.2
v2.5.1
v2.5.0
v2.4.9
v2.5-beta2
v2.4.8
v2.5-beta1
v2.4.7
v2.4.6
v2.4.5
v2.4.4
v2.4.3
v2.4.2
v2.4.1
v2.4.0
v2.3.7
v2.4-beta1
v2.3.6
v2.3.5
v2.3.4
v2.3.3
v2.3.2
v2.3.1
v2.3.0
v2.2.10
v2.3-beta2
v2.2.9
v2.3-beta1
v2.2.8
v2.2.7
v2.2.6
v2.2.5
v2.2.4
v2.2.3
v2.2.2
v2.2.1
v2.2.0
v2.1.6
v2.2-beta2
v2.1.5
v2.2-beta1
v2.1.4
v2.1.3
v2.1.2
v2.1.1
v2.1.0
v2.0.10
v2.1-beta1
v2.0.9
v2.0.8
v2.0.7
v2.0.6
v2.0.5
v2.0.4
v2.0.3
v2.0.2
v2.0.1
v2.0.0
v2.0-beta3
v1.9.6
v1.9.5
v2.0-beta2
v1.9.4-r1
v1.9.3
v2.0-beta1
v1.9.2
v1.9.1
v1.9.0-r1
v1.8.4
v1.8.3
v1.8.2
v1.8.1
v1.8.0
v1.7.3
v1.7.2-r1
v1.7.1
v1.7.0
v1.6.3
v1.6.2-r1
v1.6.1-r1
1.6.1
v1.6.0
v1.5.2
v1.5.1
v1.5.0
v1.4.2
v1.4.1
v1.4.0
v1.3.2
v1.3.1
v1.3.0
v1.2.2
v1.2.1
v1.2.0
v1.1.0
v1.0.7-r1
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3-r1
v1.0.3
1.0.0
Labels
Clear labels
beta
breaking change
complexity: high
complexity: low
complexity: medium
needs milestone
netbox
pending closure
plugin candidate
pull-request
severity: high
severity: low
severity: medium
status: accepted
status: backlog
status: blocked
status: duplicate
status: needs owner
status: needs triage
status: revisions needed
status: under review
topic: GraphQL
topic: Internationalization
topic: OpenAPI
topic: UI/UX
topic: cabling
topic: event rules
topic: htmx navigation
topic: industrialization
topic: migrations
topic: plugins
topic: scripts
topic: templating
topic: testing
type: bug
type: deprecation
type: documentation
type: feature
type: housekeeping
type: translation
Mirrored from GitHub Pull Request
No Label
status: accepted
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/netbox#240
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @dinoocch on GitHub (Jul 18, 2016).
Originally assigned to: @jeremystretch on GitHub.
It would be nice to have the ability to add the following functionality to restrict viewing of data
For example User A might not need to view Rack information, and therefore shouldn't have access to it.
(In an ideal world, we could be even more granular, specifying user group permission by global tag for example, #132, but I don't think this is necessary...)
Adding view permissions allows us to expand the users who have access to the Netbox database, which would make the tool much more flexible for us.
@ghost commented on GitHub (Jul 21, 2016):
Team permissions would be great, maybe tied to device types or device type tags, such that the ops team sees servers and related info, network team sees network and circuit gear and servers, datacenter server team sees servers and network and storage gear, etc, some/all other groups can see IP address info, etc. Possibly tied to AD group membership?
@jeremystretch commented on GitHub (Jul 29, 2016):
@rekkoner You're describing object-level permissions, which is a different ballgame. NetBox supports group-based permissions and, given its nature as an internal infrastructure tool, I think that's as far as we'll go.
@fltchr commented on GitHub (Aug 4, 2016):
@jeremystretch, would you consider permissions on the site level? We have multiple disparate sites with folks responsible for each. Aside from our infrastructure team, there's really no need for anyone to see the other sites and we definitely don't want them to have the ability to edit the other sites. If we could assign a user to a site and allow them to only see items scoped to their site, that would take care of this. Awesome product by the way. I look forward to seeing it grow.
@jvolt commented on GitHub (Aug 5, 2016):
I would like to strengthen their requests.
We do not trust anyone accessing any site or rack group, because the field team (hallways racks) do not know data center details.
@Lucho66 commented on GitHub (Aug 24, 2016):
Hi , This tool is great!! Just one question, once installed ,netbox allows anyone visiting the site see my inventory information. It is possible to authenticate the user first? and add view permissons ?, for example , some user can only the IPAM view
@fltchr commented on GitHub (Aug 25, 2016):
@Lucho66, you may set LOGIN_REQUIRED to TRUE (FALSE by default) to require a login to Netbox before viewing any data. This is in ./netbox/netbox/configuration.py.
@Lucho66 commented on GitHub (Aug 25, 2016):
thanks fltchr, this fix my problem
@jeremystretch commented on GitHub (Nov 5, 2018):
Django 2.1 introduced model-level view permissions, which permit access to a type of object (not individual objects) alongside the existing add/change/delete permissions. While enforcing these new view permissions should be fairly straightforward, I'm not sure how we'd handle their initial assignment.
If we begin enforcing but don't automatically assign the view permissions, regular users (non-superusers) won't be able to access any objects until an administrator manually assigns the permissions. However, we also don't want to blindly assign the new permissions to all users, as some organizations prefer to manage permissions at the group level.
A compromise might be to assign view permissions to any user or group with an existing add/change/delete permissions for each model, but that would still potentially block access for some users who should have it.
We could also just ignore the view permissions for the v2.5 release, giving admins time to assign permissions as they see fit before they're enforced. I'm open to suggestions.
@swerveshot commented on GitHub (Nov 11, 2018):
Just to be clear. I just read the link you posted on Django view permissions. This feature only controls read only access? So what about add/change/delete? Or is this not within the scope of this issue?
Either way adopting a permissions model from a framework you are already using this seems only logical to me. It's good that you describe the potential impact so admins of existing installs have some time to make the necessary changes for the 2.6 release. I'm glad you haven't forgotten about this issue since it is over two years old.
@swerveshot commented on GitHub (Nov 11, 2018):
Could it be that what I'm looking for is actually issue #554?
@DanSheps commented on GitHub (Nov 13, 2018):
Add/Change/Delete was already present, this just adds view permissions.
@swerveshot commented on GitHub (Nov 14, 2018):
Okay so this feature just adds the ability to assign view permissions to a particular section of the inventory. Right?
@DanSheps commented on GitHub (Nov 14, 2018):
Correct
Django 2.1 release notes
@mdaviesnz commented on GitHub (Dec 19, 2018):
@jeremystretch
In the release notes for 2.5.0 you said:
How is this actually done?
@jeremystretch commented on GitHub (Dec 20, 2018):
@mdaviesnz The same as with other permissions. Assign them to groups and/or users through the NetBox admin UI.
@fnordpojk commented on GitHub (Jan 21, 2019):
Today, if the user does not have view permissions for Secrets, that module disappears off the front page.
I assume this will also be the case for the other modules, come 2.6.0?
We are only using the Tenant and IPAM modules and this would significantly lower user confusion for us.
@candlerb commented on GitHub (Jan 25, 2019):
Right now our existing "browsing" users are not member of any group. In fact we don't have any groups created: there are browsing users, and there are admins.
So as part of the migration, if it finds there are enabled users who are not members of any group, at minimum I think Netbox should create a default "View Everything" group, and assign those users to that group.
If no other groups have any "view" permissions, then either "view" can be added to those existing groups - or all users can be added to the "View Everything" group.I think the logical and approach is simply to create a "View Everything" group and make all existing users be a member of it. This maintains functionality as-is, and can then be tightened up as required.
@jeremystretch commented on GitHub (Feb 22, 2019):
It occurs to me that view permissions should be evaluated only if
LOGIN_REQUIREDis True. Otherwise, it would be impossible to grant any useful access to anonymous users.