Bug #40450 Monitor should support ACLs
Submitted: 31 Oct 2008 5:15 Modified: 18 Dec 2008 16:25
Reporter: Gary Whizin Email Updates:
Status: Verified Impact on me:
None 
Category:MySQL Enterprise Monitor: Server Severity:S4 (Feature request)
Version:1.1.1.5780,2.0.0.7125 OS:Any
Assigned to: Assigned Account CPU Architecture:Any
Tags: mem_discuss_me, windmill

[31 Oct 2008 5:15] Gary Whizin
Description:
Request for adding multi-tenancy support to restrict which servers a user can access. This request is made from:

- companies to limit visibility to a user's departmental or other work group servers
- ISPs wanting to install a single instance of Monitor but (obviously) restrict access per user

How to repeat:
see description

Suggested fix:
Ideally provide mechanism to set access privileges at server and/or server group level. Use cases:

- user U can access server S
- user U can access server group G

- By giving access to All Servers, user would be authorized to access any new server that showed up after User was created

Default should probably grant no access rights unless explicitly stated.
[19 Nov 2008 7:50] Simon Mudd
You may also want to limit which rights are grants on some of the screens.
- The query analysis pages potentially show confidentical information
- it may not be wanted to show other host configuration information
- you may want to simply limit the page(s) that are visible to the user.

One use I see is a global read-only user for monitoring "server status". this usage is very handy but if it's global then it probably needs to have more limited rights than those available at the moment.
[12 Dec 2008 14:47] Mark Leith
Found Bug#28247 which is a duplicate of this. Marked the old one as a duplicate, as this has slightly more info in it.
[11 Jun 2009 6:29] Gary Whizin
Adding this comment from Sheeri's request (#45437, marked as duplicate:

[10 Jun 20:35] Sheeri Cabral <awfief@gmail.com>

Description:
Currently, the MySQL Enterprise Monitor has the ability to have multiple
user accounts, in 3 roles:  Administrator, Agent and DBA.

However, all DBAs have access to all the information for all the
configured databases in the monitor.  We would like to be able to
segregate which servers a user can see -- there are already server
groups and notification groups, so setting up permission groups such as
"this user can only see these servers/server groups" shouldn't be too
difficult -- not all DBAs are responsible for all servers.
[11 Jun 2009 6:32] Gary Whizin
)
[5 Oct 2009 11:30] Andrii Nikitin
bug #34238 was marked as duplicate of this, because it will be covered.
bug #23508 requests just "read-only" category of users, so it is simpler and may be implemented earlier.
[4 Nov 2009 23:37] Enterprise Tools JIRA Robot
Gary Whizin writes: 
See related issue http://bugs.mysql.com/23508
[10 Nov 2009 23:31] Chris Calender
This feature should also allow users to only be able to access a certain tab.  For instance, say you only want a certain user to be able to see the QUAN tab.  And within that, limit which servers/groups/schemas/tables any given login can access.
[11 May 2010 8:22] Mark Leith
Bug#53542 was marked as a duplicate of this one.
[29 Jul 2010 15:34] MySQL Verification Team
As Mark Leith noted in bug #53542 (http://bugs.mysql.com/bug.php?id=53542) there is a new read-only profile that does not allow access to QUAN data by default. 

This is a request to make that default configurable (either as a role or for the entire instance). This would enable the MEM administrator to set the option once and have all new read-only users granted access to QUAN data and information.
[29 Jul 2010 18:21] Simon Mudd
Indeed it doesn't make it much harder to later add other rights for each "user group" such as to each of the tabs and then define which rights each group have.

I understand you may want to go slowly with this but more flexibility is certainly important as the number of dashboard users grows. I'm certainly in that situation and it would be helpful if we could tie down permissions to certain groups of servers, such as giving pretty full access to view everything to our developers to the development db servers, but perhaps more restricted access to different production groups.
[18 Nov 2010 17:08] Mark Leith
Bug#58293 was marked as a duplicate of this one.