<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context in Alerting</title>
    <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/292472#M6148</link>
    <description>&lt;DIV&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We are also facing the same issue. Has anyone found a solution or been able to resolve it?&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Tue, 06 Jan 2026 08:56:26 GMT</pubDate>
    <dc:creator>Prema</dc:creator>
    <dc:date>2026-01-06T08:56:26Z</dc:date>
    <item>
      <title>IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273272#M5517</link>
      <description>&lt;P&gt;Hello Dynatracers,&lt;/P&gt;
&lt;P class=""&gt;I'm currently facing a challenge in configuring IAM policies to restrict problem visibility in the &lt;STRONG&gt;New Problems App&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class=""&gt;We have a user group, &lt;STRONG&gt;ABC&lt;/STRONG&gt;, which is assigned the &lt;STRONG&gt;Standard user policy&lt;/STRONG&gt;, and is further restricted by a &lt;STRONG&gt;policy boundary&lt;/STRONG&gt; that includes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P class=""&gt;A specific &lt;STRONG&gt;Management Zone (MZ)&lt;/STRONG&gt; rule&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class=""&gt;A separate &lt;STRONG&gt;Security Context&lt;/STRONG&gt; rule&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class=""&gt;When a user from this ABC group logs in:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P class=""&gt;They are &lt;STRONG&gt;able to access the New Problems App&lt;/STRONG&gt;, but&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class=""&gt;&lt;STRONG&gt;No problems are visible&lt;/STRONG&gt; in the app (nor on any dashboard widgets based on the new Problems view)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class=""&gt;Interestingly, as soon as we remove the &lt;STRONG&gt;policy boundary&lt;/STRONG&gt;, they are able to view all problems — but this is not acceptable, as we don't want users to view problems beyond their relevant MZ.&lt;/P&gt;
&lt;P class=""&gt;With the &lt;STRONG&gt;traditional Problems App&lt;/STRONG&gt;, the same boundary configuration works as expected — problems are scoped correctly to their MZ.&lt;/P&gt;
&lt;P class=""&gt;Our challenge is:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P class=""&gt;The &lt;STRONG&gt;New Problems App&lt;/STRONG&gt; does not honor the MZ/Security Context restriction in the same way&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class=""&gt;Our new dashboards rely on this new Problems view, meaning these restricted users now see &lt;EM&gt;nothing&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class=""&gt;&lt;STRONG&gt;Request:&lt;/STRONG&gt; How can we configure IAM policies and boundaries so that:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P class=""&gt;Users can view problems in the New Problems App and dashboards&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class=""&gt;But only those problems within their assigned Management Zone or Security Context&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class=""&gt;Is there a supported way to achieve this today? Or a roadmap plan to support MZ-based scoping in the New Problems App similar to the legacy behavior?&lt;/P&gt;
&lt;P class=""&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 07:51:23 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273272#M5517</guid>
      <dc:creator>anaidu</dc:creator>
      <dc:date>2025-03-24T07:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273353#M5518</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You just need to create a custom IAM policy with the storage:events:read permission.&lt;/P&gt;&lt;P&gt;For example:&lt;BR /&gt;ALLOW storage:events:read WHERE storage:dt.security_context = "&amp;lt;value&amp;gt;";&lt;/P&gt;&lt;P&gt;You can find other conditions here: &lt;A href="https://docs.dynatrace.com/docs/shortlink/iam-policystatements#storage-events-read" target="_blank"&gt;https://docs.dynatrace.com/docs/shortlink/iam-policystatements#storage-events-read&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;BR /&gt;Patryk&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 20:53:52 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273353#M5518</guid>
      <dc:creator>patryk_ozimek2</dc:creator>
      <dc:date>2025-03-24T20:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273356#M5519</link>
      <description>&lt;P&gt;The whole permissions list is available in DT Hub&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="patryk_ozimek_0-1742850294744.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/27152iD6970D7E5364A309/image-size/medium?v=v2&amp;amp;px=400" role="button" title="patryk_ozimek_0-1742850294744.png" alt="patryk_ozimek_0-1742850294744.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 21:06:04 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273356#M5519</guid>
      <dc:creator>patryk_ozimek2</dc:creator>
      <dc:date>2025-03-24T21:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273371#M5521</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/68822"&gt;@anaidu&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class=""&gt;I suggest opening a support ticket, as the current behavior doesn't align with what's described in the documentation: &lt;A href="https://docs.dynatrace.com/docs/shortlink/iam-policystatements" target="_new" rel="noopener"&gt;https://docs.dynatrace.com/docs/shortlink/iam-policystatements&lt;/A&gt;. Some conditions and operators don’t seem to function as expected.&lt;/P&gt;&lt;P class=""&gt;As a temporary workaround—which may not cover all scenarios—you could try creating a separate policy specifically for event access. Be sure to use the condition within the policy itself, not as a boundary.&lt;/P&gt;&lt;P class=""&gt;You can use the dt.host_group.id with the IN operator. For example:&lt;/P&gt;&lt;P&gt;ALLOW storage:events:read WHERE storage:dt.host_group.id IN ("")&lt;/P&gt;&lt;P&gt;This might not fully resolve the issue, but it could serve as a helpful interim step.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 04:52:34 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273371#M5521</guid>
      <dc:creator>Mohamed_Hamdy</dc:creator>
      <dc:date>2025-03-25T04:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273372#M5522</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/49174"&gt;@patryk_ozimek2&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Thanks for sharing. We've applied the same configuration using these rules across both events and other storage types, but it's still not working.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 05:40:18 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273372#M5522</guid>
      <dc:creator>anaidu</dc:creator>
      <dc:date>2025-03-25T05:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273373#M5523</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/4007"&gt;@Mohamed_Hamdy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Thanks for sharing the workaround, we will use as interim solution till the issue is completely resolved.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 05:42:40 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273373#M5523</guid>
      <dc:creator>anaidu</dc:creator>
      <dc:date>2025-03-25T05:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273374#M5524</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/68822"&gt;@anaidu&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In parallel while applying the relevant solutions provided by&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/4007"&gt;@Mohamed_Hamdy&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/49174"&gt;@patryk_ozimek2&lt;/a&gt;&amp;nbsp;, feel free to raise the case as a &lt;A href="https://community.dynatrace.com/t5/Product-ideas/idb-p/DynatraceProductIdeas" target="_self"&gt;product idea&lt;/A&gt;&lt;/P&gt;&lt;P&gt;KR,&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 05:54:00 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273374#M5524</guid>
      <dc:creator>Peter_Youssef</dc:creator>
      <dc:date>2025-03-25T05:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273895#M5543</link>
      <description>&lt;P&gt;Are you sure that you have events in grail enabled in your tenant?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Patryk&lt;/P&gt;</description>
      <pubDate>Sun, 30 Mar 2025 19:16:07 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/273895#M5543</guid>
      <dc:creator>patryk_ozimek2</dc:creator>
      <dc:date>2025-03-30T19:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/274374#M5562</link>
      <description>&lt;P&gt;Hi all !&amp;nbsp;&lt;BR /&gt;I have the same problem&lt;/P&gt;&lt;P&gt;What I see is that my Problem didn't have a dt.security_context field filled. I tried to apply &lt;A href="https://docs.dynatrace.com/docs/shortlink/davis-ai-problems-use-cases#manage-the-access-to-problem-records" target="_self"&gt;the documentation here&lt;/A&gt;, but the field still keep empty.&lt;BR /&gt;Anyone already fix that ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2025 16:44:37 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/274374#M5562</guid>
      <dc:creator>J01am</dc:creator>
      <dc:date>2025-04-03T16:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/277821#M5659</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I encountered the same problem. Seems like there is no permissions for&amp;nbsp;&lt;SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;dt.davis.problems&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you open developer tools in your browser and query something in the new problems app you can find a request with query: "&lt;SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;{ &lt;/SPAN&gt;&lt;SPAN class=""&gt;canonicalQuery&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;'fetch dt.davis.problems, from:now() - 2h&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; ..."&lt;/P&gt;&lt;P&gt;So we have to follow this &lt;A href="https://docs.dynatrace.com/docs/shortlink/davis-ai-problems-use-cases#manage-the-access-to-problem-records" target="_self"&gt;doc.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I don't know how should I set problem fields for security context. I can add only one field that maps something to the security context and I have no idea what to use here to make sure that every event will have security context mapped.&lt;/P&gt;&lt;P&gt;Is there any recommended approach?&lt;/P&gt;&lt;P&gt;I don't know why DT complicated it that much.&lt;/P&gt;&lt;P&gt;Best Regards&lt;BR /&gt;Patryk&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 12:10:51 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/277821#M5659</guid>
      <dc:creator>patryk_ozimek2</dc:creator>
      <dc:date>2025-05-22T12:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/281233#M5750</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;We are facing the same issue, do you know when the fix will be delivered ?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Best Regards,&lt;BR /&gt;&lt;BR /&gt;Florent&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 08:02:35 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/281233#M5750</guid>
      <dc:creator>ftmazzone</dc:creator>
      <dc:date>2025-07-10T08:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/281557#M5756</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/20299"&gt;@peter&lt;/a&gt;,&lt;BR /&gt;I've created a ticket to the support. Do you have any update on your side about this issue? Currently the boundaries cannot be used as they won't work with all Dynatrace apps.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Kr,&lt;BR /&gt;&lt;BR /&gt;Florent&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 08:55:58 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/281557#M5756</guid>
      <dc:creator>ftmazzone</dc:creator>
      <dc:date>2025-07-15T08:55:58Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/292472#M6148</link>
      <description>&lt;DIV&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We are also facing the same issue. Has anyone found a solution or been able to resolve it?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 06 Jan 2026 08:56:26 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/292472#M6148</guid>
      <dc:creator>Prema</dc:creator>
      <dc:date>2026-01-06T08:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/292479#M6149</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/80075"&gt;@Prema&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;I've found a solution using &lt;A href="https://docs.dynatrace.com/docs/manage/identity-access-management/use-cases/access-security-context" target="_self"&gt;security context&lt;/A&gt; and &lt;A href="https://docs.dynatrace.com/docs/discover-dynatrace/references/dynatrace-api/environment-api/settings/schemas/builtin-openpipeline-davis-problems-pipelines" target="_self"&gt;OpenPipeline Davis Problems.&lt;/A&gt;&amp;nbsp;I set the security context of the problems with an open pipeline and configure the access of the users with a &lt;A href="https://docs.dynatrace.com/docs/manage/identity-access-management/permission-management/manage-user-permissions-policies/advanced/iam-policy-templating" target="_self"&gt;template policy.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Example of policy :&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;ALLOW storage:events:read WHERE storage:dt.security_context IN ("${bindParam:security-context-ids}");&lt;/LI-CODE&gt;&lt;P&gt;However it would be much more logic, if the problems generated with one agents generated traces or metrics already had a security context set per default.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2026 13:42:09 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/292479#M6149</guid>
      <dc:creator>ftmazzone</dc:creator>
      <dc:date>2026-01-06T13:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/294342#M6195</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/89392"&gt;@ftmazzone&lt;/a&gt;&amp;nbsp;, Can i have this in detailed way. because we are using boundaries restricted with management zone and security context. But unfortunately, users with these permissions are unable to view the latest UI/ Gen3 based environment like data/metrics/logs&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 17:08:13 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/294342#M6195</guid>
      <dc:creator>kranthi</dc:creator>
      <dc:date>2026-02-06T17:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/294422#M6197</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/91549"&gt;@kranthi&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;We don't use boundaries but &lt;A href="https://docs.dynatrace.com/docs/manage/identity-access-management/permission-management/manage-user-permissions-policies/advanced/iam-policy-templating?_gl=1*19r5oo*_ga*MTMyODA2MTQ5Mi4xNzcwNjM0MjA2*_ga_1MEMV02JXV*czE3NzA2Mzk4NTUkbzIkZzEkdDE3NzA2NDEzOTUkajgkbDAkaDA." target="_self"&gt;template policies&lt;/A&gt;&amp;nbsp;however both should work.&lt;BR /&gt;&lt;BR /&gt;1. Could you check if the field `dt.security_context` is set and visible in the page `Problems` ?&lt;BR /&gt;2. Are the logs or metrics with the same `dt.security_context` visible for the users havbing this boundary ?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 12:56:24 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/294422#M6197</guid>
      <dc:creator>ftmazzone</dc:creator>
      <dc:date>2026-02-09T12:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: IAM Policies for New Problems App: Restricting Problem Visibility by Management Zone or Security Context</title>
      <link>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/294427#M6199</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/89392"&gt;@ftmazzone&lt;/a&gt;&amp;nbsp;, Actually this parameter is available for account admins, environments admis.&lt;BR /&gt;In our case we are actually looking to restrict the user with boundaries for latest UI we are using&amp;nbsp;&lt;SPAN&gt;`dt.security_context` as suggested by Dynatrace Vendor similarly for Classic UI we are using management zones. User's able to view all of the allowed information in Classic UI but, when it comes to latest UI of dynatrace entities and its names along with&amp;nbsp;`dt.security_context` is visible but user's unable to view the metrics, logs, kuberenetes node names, workload names, etc. But data/metrics/logs related to them is not visible to the user's.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 13:13:41 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/IAM-Policies-for-New-Problems-App-Restricting-Problem-Visibility/m-p/294427#M6199</guid>
      <dc:creator>kranthi</dc:creator>
      <dc:date>2026-02-09T13:13:41Z</dc:date>
    </item>
  </channel>
</rss>

