Add Tenant and Tenant Group to virtual chassis #7528

Closed
opened 2025-12-29 20:24:47 +01:00 by adam · 5 comments
Owner

Originally created by @ShellBoyAFK on GitHub (Jan 18, 2023).

NetBox version

v3.4.2

Feature type

Change to existing functionality

Proposed functionality

Some of our virtual chassis are located in different sites and in different tenants. Until now, the individual tenants always see all virtual chassis of the other tenants.
This is due to the fact that until now you don't have the possibility to assign them to a teanant / tenant group. So I can not regulate them with permissions in the Django admin area.

Use case

If necessary this would be good, if

  • Tenant A only sees virtual chassis from Tenant A
  • Tenant B sees only virtual chassis of Tenant B

Database changes

?

External dependencies

?

Originally created by @ShellBoyAFK on GitHub (Jan 18, 2023). ### NetBox version v3.4.2 ### Feature type Change to existing functionality ### Proposed functionality Some of our virtual chassis are located in different sites and in different tenants. Until now, the individual tenants always see all virtual chassis of the other tenants. This is due to the fact that until now you don't have the possibility to assign them to a teanant / tenant group. So I can not regulate them with permissions in the Django admin area. ### Use case If necessary this would be good, if - Tenant A only sees virtual chassis from Tenant A - Tenant B sees only virtual chassis of Tenant B ### Database changes ? ### External dependencies ?
adam added the type: featurepending closurestatus: under review labels 2025-12-29 20:24:47 +01:00
adam closed this issue 2025-12-29 20:24:47 +01:00
Author
Owner

@jeremystretch commented on GitHub (May 25, 2023):

I don't think it makes sense to assign tenancy to a virtual chassis directly. Why wouldn't this be inferred from its master/member devices?

@jeremystretch commented on GitHub (May 25, 2023): I don't think it makes sense to assign tenancy to a virtual chassis directly. Why wouldn't this be inferred from its master/member devices?
Author
Owner

@ShellBoyAFK commented on GitHub (Jul 27, 2023):

in short: security/data protection we call it (EU-DSGVO, DS-GVO ISO27001 / ISMS / KHZG) authorisations.

So we don't want tenant A to see tenant B's virtual chassis.

If someone has permission to do something, then they are allowed to do it.

In short, all users, are in different and distinct groups and these have different permissions filtered on tenants and tenants groups.

It's not my fault that security is a by-product in our society.

@ShellBoyAFK commented on GitHub (Jul 27, 2023): in short: security/data protection we call it (EU-DSGVO, DS-GVO ISO27001 / ISMS / KHZG) authorisations. So we don't want tenant A to see tenant B's virtual chassis. If someone has permission to do something, then they are allowed to do it. In short, all users, are in different and distinct groups and these have different permissions filtered on tenants and tenants groups. It's not my fault that security is a by-product in our society.
Author
Owner

@DanSheps commented on GitHub (Jul 27, 2023):

So we don't want tenant A to see tenant B's virtual chassis.

You would add a constraint to the permissions handle this:

{"master__tenant": "Tenant A"}

I agree and do not see a need for tenancy here.

@DanSheps commented on GitHub (Jul 27, 2023): > So we don't want tenant A to see tenant B's virtual chassis. You would add a constraint to the permissions handle this: `{"master__tenant": "Tenant A"}` I agree and do not see a need for tenancy here.
Author
Owner

@github-actions[bot] commented on GitHub (Oct 26, 2023):

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. NetBox is governed by a small group of core maintainers which means not all opened issues may receive direct feedback. Do not attempt to circumvent this process by "bumping" the issue; doing so will result in its immediate closure and you may be barred from participating in any future discussions. Please see our contributing guide.

@github-actions[bot] commented on GitHub (Oct 26, 2023): This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. NetBox is governed by a small group of core maintainers which means not all opened issues may receive direct feedback. **Do not** attempt to circumvent this process by "bumping" the issue; doing so will result in its immediate closure and you may be barred from participating in any future discussions. Please see our [contributing guide](https://github.com/netbox-community/netbox/blob/develop/CONTRIBUTING.md).
Author
Owner

@github-actions[bot] commented on GitHub (Nov 26, 2023):

This issue has been automatically closed due to lack of activity. In an effort to reduce noise, please do not comment any further. Note that the core maintainers may elect to reopen this issue at a later date if deemed necessary.

@github-actions[bot] commented on GitHub (Nov 26, 2023): This issue has been automatically closed due to lack of activity. In an effort to reduce noise, please do not comment any further. Note that the core maintainers may elect to reopen this issue at a later date if deemed necessary.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/netbox#7528