-
Notifications
You must be signed in to change notification settings - Fork 86
No Security Permissions for Retro Boards #5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Unfortunately this is technically impossible while the Azure DevOps internal extension data storage is used. All users in the project collection allways have full read and write access. |
I concur if there is a way to add security to retrospectives (ignoring the collection admin), it might be helpful. e.g. How individual repos/pipelines can be denied permissions. |
The main task in this case is to limit the visibility of the "Retrospectives" section to certain groups of users or specified teams. In our project, the Customer (Stakeholder) is connected to ADO and can see everything, including the retrospective boards, which is highly undesirable, since commercial information can also be discussed in the retrospective. I guess half of the teams have a similar problem. There is no direct solution based on showing / hiding the "Retrospectives" section due to the way the extensions are implemented. However, there is a workaround that will allow you to customize access (but not visibility) to a section for specific teams. To implement it, you need:
|
All Project users/teams can view the Retrospectives.
Our team's retros are a safe place to raise issues encountered during sprints and it is not desirable that this feedback could be viewed by other users outside of the Scrum team.
The text was updated successfully, but these errors were encountered: