mirror of
https://github.com/dflow-sh/dflow.git
synced 2026-04-26 13:55:56 +03:00
[GH-ISSUE #342] Role-Based Access Control (RBAC) for Team Members #222
Labels
No labels
backend
bug
developer
documentation
enhancement
enhancement
enhancement
feature
feature
fix
frontend
frontend
good first issue
help wanted
pull-request
safety-check
security
styles
styles
templates
templates
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/dflow#222
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @jagadeesh507 on GitHub (Jul 14, 2025).
Original GitHub issue: https://github.com/dflow-sh/dflow/issues/342
Originally assigned to: @jagadeesh507 on GitHub.
✨ Feature Request: Role-Based Access Control (RBAC) for Team Members
Description
Introduce Role-Based Access Control (RBAC) to allow workspace admins to manage access permissions for team members.
Admins should be able to create custom roles from the dashboard, assigning specific permissions (create, read, update, delete) across various resource types such as:
...and more.
💡 Motivation
✅ Expected Behavior
📌 Notes
@jagadeesh507 commented on GitHub (Jul 25, 2025):
✨ New Feature: Role-Based Access Control (RBAC) for Team Members
We’ve implemented Role-Based Access Control (RBAC) to enhance how workspace admins manage team permissions. This feature brings fine-grained access control across all collections and actions within the platform.
🔑 Key Features
Create Custom Roles
Update Role Permissions
Assign Roles to Team Members
Granular Collection Permissions
Enforced Action Restrictions with Feedback
Role-Based Access Control on Actions using
next-safe-actionsRole Validation through
protectedClientprotectedClientwrapper enforces role checks automatically.⚙️ Example: Action Role Configuration
To enforce RBAC on this action, configure the required role permission in your role-permission mapping:
createTemplateActionrequires create permission on the templates collection.