Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: Enterprise Use Case Tutorial - User Management, Access Controls, and Auditing with Feature Flags #8998

Open
wants to merge 7 commits into
base: main
Choose a base branch
from

Conversation

nnennandukwe
Copy link
Contributor

About the changes

We're adding a new enterprise use case tutorial on user management, access controls, and auditing with feature flags.

All updates in this PR are changes made post-review of the Google Doc.

Screenshot 2024-12-18 at 12 22 10 PM

Closes #

Important files

Discussion points

Copy link

vercel bot commented Dec 18, 2024

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
unleash-docs ❌ Failed (Inspect) Jan 13, 2025 9:06pm
unleash-monorepo-frontend ✅ Ready (Inspect) Visit Preview 💬 Add feedback Jan 13, 2025 9:06pm

Copy link
Contributor

github-actions bot commented Dec 18, 2024

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

OpenSSF Scorecard

PackageVersionScoreDetails

Scanned Files

Copy link
Collaborator

@ferrantim ferrantim left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. Still needs an engineering review but it is good from my perspective with the requested changes. Thanks!

1. Owner
2. Member

Assign users with root roles to configure entire systems. These users can perform any operation within the Unleash platform and change permissions for other users when they belong to a specific user group.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't understand this sentence when paired with the fact that there are Admin, Editor and Viewer root roles. It would seem that a Viewer with a Root role wouldn't be able to "erform any operation within the Unleash platform and change permissions for other users when they belong to a specific user group." Can you clarify if this is for all root roles, or just admin? Also, if just for Admin, what does root role mean for Editor or Viewer? My guess is that they would have that level of access for all projects across the entire Unleash instance, not project by project but we should verify and clarify this point.

- **Four-eyes approval workflows**: Multi-stage approval processes ensure critical changes are thoroughly reviewed and approved by at least 2 other people before implementation.
- **Compliance requirements**: For regulated industries like finance and healthcare, Change Requests provide the detailed documentation necessary to meet strict compliance standards.

![Change requests are divided between two tabs: open and closed change request lists with relevant metadata listed per request.](/img/use-case-user-mgmt-change-requests.png)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This sentence is hard to parse. Can you revisit it please?

4. Final sign-off from technical leadership

![This GIF shows how to quickly make changes to your flag, request the change, approve it, and apply the changes.](/img/use-case-user-mgmt-cr.gif)

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would like to add a link to Mateusz's blog on this topic. https://www.getunleash.io/blog/feature-flag-change-requests-how-to

Something like "For more detail on what enterprise-level change requests should include read our blog


The most advanced implementations integrate Unleash audit logs directly into broader Security Information and Event Management (SIEM) systems. This enables real-time monitoring and creates a holistic view of system interactions across multiple platforms. By correlating Unleash audit data with other enterprise security logs, organizations can detect subtle patterns and potential security anomalies that might go unnoticed in isolated systems.

By implementing intelligent, automated, and granular access controls, organizations can create a secure foundation for continuous delivery at scale.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This conclusion sentence seems out of place. Only refers to access controls, not the rest of the topics in the blog.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Approved PRs
Development

Successfully merging this pull request may close these issues.

2 participants