Issue
We have a requirement to allow teams to have access to Job/Configure without any permissions within Client/Managed Controller Configure and Client/Managed Controller Lifecycle. We can not allow development teams to override the configuration on their controllers.
Resolution
First of all, it is worth noting that enabling the permission Job/Configure greys out the permissions Client/Managed Controller Configure and Client/Managed Controller Lifecycle, because granting the former implies granting the latter.
That being said, let’s explain how this use case can be covered. First, in the role matrix, you have to add a create role granting the permission Job/Create. (browse and develop roles are the default ones added besides administer when selecting RBAC → Typical initial setup (ignoring existing authorization strategy)).
Then, using the principles to achieve RBAC granularity from RBAC: Limit folder access, we will configure browser, developer, and create groups as shown in the following screenshot.
Then, we will configure the browser group at current level without propagation at CJOC and at controller level:
Following, we will configure the developer group at child level with propagation at controller level:
Finally, we will configure the create group at current level without propagation at controller level:
You can check the results from the previous RBAC configuration in the below 3 screenshots (at CJOC level, at controller level, and at job level, respectively).