> Please let me know if you have any thoughts on this. Again, I'll be
> happy to enter any tickets resulting from a discussion like this that
> would lead to features in this direction.
As a local administrator, I've wished for two things along these lines:
1) Set users' full names. (Many of them forget to do that. I could
track them down and bother them about it, but fixing it for them seems
quicker and more reliable -- at least at the current scale.)
2) Retire accounts for people who are no longer with the company. (By
"retire" I primarily mean they should not show up in the suggested
completions for text boxes, but there might be other places that should
also be modified.)
Michael Poole
2 is covered by issue 503 [1].
Can you use LDAP for 1? That's a nice way to handle it.
[1] http://code.google.com/p/gerrit/issues/detail?id=503
--
Employee of Qualcomm Innovation Center, Inc.
Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum
Exactly what Nasser said.
However, LDAP may not work for everyone. There are some folks using
OpenID. Or using HTTP and don't have an LDAP directory available to
rely on. So I still think the need to edit a user's full name is a
reasonable request.
I'm not OK with the idea of impersonating a user. I am however OK
with the idea that an Administrator can view and modify most of a
user's settings panel. Especially something relatively harmless like
their full name, or changing the preferred email address. Where it
gets touchy is, can the Administrator add an SSH key for the user?
Can the Administrator see the user's password? I think those two
operations should be forbidden. But it is reasonable for the admin to
see/change the username. Or to see the current SSH keys, or even to
delete them. That way they can lock out an SSH key as soon as they
know its compromised or otherwise must be invalidated.
I've always planned to have a Admin > Users tab, to manage contributor
agreements, and simple per-user settings. But I just never got time
to develop it. If someone does the work, I think it would make a lot
of admins happy.
True.
> A way to disarm the sensitivity of this would be if we
> could add a transparancy to what we're doing.
> An example of that would be if gerrit sent a status email everytime an
> admin changed any sensitive data for the user.
> Example:
> "ALERT: Admin Fredrik deleted public RSA key ####1"
> "ALERT: Admin Fredrik added public RSA key ###2"
> The mailing mechanism is already in place. Why not use it?
I like this idea. If we are going to permit an admin to modify this
data, we should try to notify the user.
> And the fact is that the key is already stored in the DB, physically
> accessible by the machine admin. So it's a question of how easy it
> should be to do this? Maybe it's own right so not all admins can do
> it, in case you have many admins?
My issue is, my Administrators group is larger than those who have
login access to the database. Its hard to a Venn diagram by email.
But I guess I can explain the trust like this:
- UNIX root
- Gerrit database admin / direct write access to filesystem
- Administrators group
- Project owners
- Everyone else
As it so happens, our Administrators group is like 2-4x the number of
those with database admin or UNIX root rights. Those admins can
create projects, or should be able to fix a user's full name or
username field. But they probably shouldn't be able to add an SSH key
on behalf of the user. So I probably would prefer it if we could
restrict who can add an SSH key to another user's account.