Uploaded image for project: 'Bitbucket Data Center'
  1. Bitbucket Data Center
  2. BSERV-3406

Provide a Repository Creator permission per project

XMLWordPrintable

    • 165
    • We collect Bitbucket feedback from various sources, and we evaluate what we've collected when planning our product roadmap. To understand how this piece of feedback will be reviewed, see our Implementation of New Features Policy.

      Atlassian status as of Jul 2022

      Hi everyone,

      I'm happy to announce that in Bitbucket 8.2 we have added project-level permission - Create repository. The new permission is essentially Project Write permission with ability to create new repositories. If a user having new permission creates a repository they become repository admin. You don't need to grant Project Admin permission to everyone who needs to create repositories in projects anymore. We believe this change will help you facilitate self-service and improve security posture of your Bitbucket as you will be able to better control the number of Project Admin and grant it only to users whose duties require admin access.

      You can read more about the feature Bitbucket 8.2 release notes, and feature docs.

      Cheers,
      Anton Genkin
      Product Manager

      Original suggestion

      In the parent issue (STASH-2789), the user asked for a way to give global Project Creator users permission to create repositories in projects which they do not own. It was closed because it was said that this was the intended behavior.

      However, our team would still benefit from being able to create new repositories inside projects that they do not own. Could we have a Repository Creator role per project so that certain users can create repositories in a project regardless of whether they were the creator?

              Unassigned Unassigned
              chad.gilbert Chad Gilbert
              Votes:
              138 Vote for this issue
              Watchers:
              104 Start watching this issue

                Created:
                Updated:
                Resolved: