Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Settings security view is broken if only SETTINGS_SETMARKINGS capa #7243

Closed
Kedae opened this issue Jun 5, 2024 · 0 comments · Fixed by #7244
Closed

Settings security view is broken if only SETTINGS_SETMARKINGS capa #7243

Kedae opened this issue Jun 5, 2024 · 0 comments · Fixed by #7244
Assignees
Labels
bug use for describing something not working as expected critical use to identify critical bug to fix ASAP rbac Linked to RBAC and ACL systems solved use to identify issue that has been solved (must be linked to the solving PR)
Milestone

Comments

@Kedae
Copy link
Member

Kedae commented Jun 5, 2024

If you have only the SETTINGS_SETMARKINGS as an admin the Security screen is broken.

@Kedae Kedae added bug use for describing something not working as expected critical use to identify critical bug to fix ASAP labels Jun 5, 2024
@Kedae Kedae linked a pull request Jun 5, 2024 that will close this issue
@Kedae Kedae added this to the Release 6.1.9 milestone Jun 5, 2024
@Kedae Kedae added the solved use to identify issue that has been solved (must be linked to the solving PR) label Jun 5, 2024
daimyo007 pushed a commit to fbicyber/opencti__opencti that referenced this issue Jun 24, 2024
@Jipegien Jipegien added the rbac Linked to RBAC and ACL systems label Jul 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug use for describing something not working as expected critical use to identify critical bug to fix ASAP rbac Linked to RBAC and ACL systems solved use to identify issue that has been solved (must be linked to the solving PR)
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants