Right now, any user who has the "Manage Service Account" permission can assign Admin roles to a Service Account. This allows non-admin users to create SAs with Admin access and generate tokens to perform admin-level actions — which is a security risk.
Why It Matters:
This can lead to unnecessary privilege, where a user who is not supposed to have full access ends up gaining it by assigning Admin roles to SAs they create.
Suggestion:
Add a feature to restrict role assignments, so only users with proper permissions can assign Admin (or other sensitive) roles to Service Accounts. This could be done by:
Splitting the “Manage SA” permission into smaller ones like “Edit SA” and “Assign Role”
Adding checks to prevent non-admins from assigning high-level roles
Created by Manisha Choudhary
·