-
Notifications
You must be signed in to change notification settings - Fork 159
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
admin identities have bind and dial permissions to services #1781
Comments
scareything
added a commit
that referenced
this issue
Feb 28, 2024
scareything
added a commit
that referenced
this issue
Feb 28, 2024
scareything
added a commit
that referenced
this issue
Feb 28, 2024
scareything
added a commit
that referenced
this issue
Feb 28, 2024
scareything
added a commit
that referenced
this issue
Feb 28, 2024
scareything
added a commit
that referenced
this issue
Apr 9, 2024
Fixed in #1782 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Admin identities have bind and dial permissions to any/all services. This causes tunnelers to intercept and host services when run with an admin identity, which can lead to potentially confusing issues like connection feedback.
Admin identifies would be more predicable and practical if they didn't automatically have bind and dial permissions to services. Instead these permissions can be granted with policies as desired by the end-user.
The text was updated successfully, but these errors were encountered: