<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict settings API tokens based on policies in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/Restrict-settings-API-tokens-based-on-policies/m-p/224113#M28733</link>
    <description>&lt;P&gt;At the moment, tokens use their own scopes so you can't use policies on them, that's correct. I could see the benefit of being able to provide policies for API tokens as well.&lt;/P&gt;&lt;P&gt;The only workaround today is&amp;nbsp;&lt;A title="PATs" href="https://www.dynatrace.com/support/help/manage/access-control/access-tokens/personal-access-token" target="_blank" rel="noopener"&gt;personal access tokens&lt;/A&gt;&amp;nbsp;which inherit the permissions of the user that created the token, so this means also the policies attached to the customer.&lt;/P&gt;</description>
    <pubDate>Thu, 28 Sep 2023 12:59:12 GMT</pubDate>
    <dc:creator>victor_balbuena</dc:creator>
    <dc:date>2023-09-28T12:59:12Z</dc:date>
    <item>
      <title>Restrict settings API tokens based on policies</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Restrict-settings-API-tokens-based-on-policies/m-p/224110#M28731</link>
      <description>&lt;P&gt;There is the option to use security policies to give users direct view or edit access on some specific schema's.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;ALLOW settings:objects:read, settings:objects:write, settings:schemas:read
WHERE settings:schemaId = "builtin:alerting.maintenance-window";&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But how can I create an API token with only that permission? The API-token scopes are not fine grained I presume.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 12:44:24 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Restrict-settings-API-tokens-based-on-policies/m-p/224110#M28731</guid>
      <dc:creator>Bert_VanderHeyd</dc:creator>
      <dc:date>2023-09-28T12:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict settings API tokens based on policies</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Restrict-settings-API-tokens-based-on-policies/m-p/224113#M28733</link>
      <description>&lt;P&gt;At the moment, tokens use their own scopes so you can't use policies on them, that's correct. I could see the benefit of being able to provide policies for API tokens as well.&lt;/P&gt;&lt;P&gt;The only workaround today is&amp;nbsp;&lt;A title="PATs" href="https://www.dynatrace.com/support/help/manage/access-control/access-tokens/personal-access-token" target="_blank" rel="noopener"&gt;personal access tokens&lt;/A&gt;&amp;nbsp;which inherit the permissions of the user that created the token, so this means also the policies attached to the customer.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 12:59:12 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Restrict-settings-API-tokens-based-on-policies/m-p/224113#M28733</guid>
      <dc:creator>victor_balbuena</dc:creator>
      <dc:date>2023-09-28T12:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict settings API tokens based on policies</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Restrict-settings-API-tokens-based-on-policies/m-p/224119#M28735</link>
      <description>&lt;P&gt;Using personal access tokens is difficult because it would require some kind of technical user which we don't have. It's not the biggest deal off course since we treat tokens as secrets. But if one would leak, it would give access to all settings while it could be restricted.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 13:23:22 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Restrict-settings-API-tokens-based-on-policies/m-p/224119#M28735</guid>
      <dc:creator>Bert_VanderHeyd</dc:creator>
      <dc:date>2023-09-28T13:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict settings API tokens based on policies</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Restrict-settings-API-tokens-based-on-policies/m-p/236185#M30886</link>
      <description>&lt;P&gt;We have the same need here, we would like token (not personal ones) with more granular security to be able to give teams the right to manage only what they are supposed to.&lt;BR /&gt;it is a big show stopper for devops practices&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2024 20:13:12 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Restrict-settings-API-tokens-based-on-policies/m-p/236185#M30886</guid>
      <dc:creator>nicolas_nguyen</dc:creator>
      <dc:date>2024-02-02T20:13:12Z</dc:date>
    </item>
  </channel>
</rss>

