Page MenuHomePhabricator

Allow user account enable/disable to be a delegatable to non admins
Closed, DuplicatePublic

Description

We are trying to delegate the management of access to our Phabricator install, so I create an "access" project and set the People application so that members of this project can create new (non-bot) accounts. I then realized, however, that this permission does not allow re-enabling disable accounts. We had an intern who left for a while and then came back, and members of the "access" project could not re-enable this access.

Event Timeline

joshuaspence raised the priority of this task from to Needs Triage.
joshuaspence updated the task description. (Show Details)
joshuaspence added a project: People.
joshuaspence added a subscriber: joshuaspence.
chad renamed this task from "Can create users" policy doesn't allow re-enabling accounts to Allow user account enable/disable to be a delegatable to non admins.Jul 30 2015, 5:24 AM

Can you just give more users admin permissions?

I'd rather not. We have a lot of staff who manage access and most of them I don't want poking around as an admin.

What specific administrator abilities are you concerned about them having?

A couple of things offhand:

  • ability to modify configuration
  • ability to install/uninstall applications
  • ability to change policies

Mostly its probably more so that I don't want people fiddling with things that they don't understand.l rather than any specific security concerns. This is possibly more of a cultural problem than a technical one.

It sounds like we could possibly resolve this by letting you change application edit policies instead, which I intend to do eventually. That said, I don't think adding an enable/disable policy is necessarily unreasonable, and it's generally in the vein of other similar policies.

Would "Role Profiles" solve this, ie, psuedo-admins?