Details
-
Suggestion
-
Resolution: Unresolved
-
None
-
24
-
Description
Issue Summary
For users with managed accounts, when company is worries about their IP to be cloned and posted as public. The Admin of the Organization would like to have a granular control over:
- who can create a repository in their own space outside of company shared one
- what type of repository (public/private) the user can create
- Prevent the user from posting anything publicly on Bitbucket
- Allow Admins to see which user has App Password uploaded to their Bitbucket account
- Which user has SSH keys uploaded to their Bitbucket Account.
- Visibility into when the managed user last accessed Bitbucket Cloud workspace
- Visibility into when the managed user last made changes to their Bitbucket Cloud workspace
- Prevent managed accounts to create workspaces
- Ability for admins to control who can use PAT/WAT/RATs for accessing workspace content
- Ability for admins to restrict the use of app passwords from accessing private content of the workspace
- Ability for admins to restrict the use of SSH keys from accessing the private content of the workspace
Steps to Reproduce
NA
Expected Results
To prevent any user with a managed account to create a public repo against their owned workspace
Actual Results
As of right now, we do not have a way to prevent users with managed accounts from creating individual workspace and publish any data on there, public or private
Workaround
none
Attachments
Issue Links
- is related to
-
BCLOUD-20289 Ability for an org/team admin to block users from creating/importing/forking repositories to a different workspace
- Under Consideration
-
ENT-1461 Loading...
-
ENT-1770 Loading...
- relates to
-
ACCESS-1327 Control workspace privacy setting for managed accounts
- Gathering Interest
-
ACCESS-1490 Bitbucket App Password (api token) Password Policy Controls
- Gathering Interest