Resolve "Feature flag enable read security attribute globally"
What does this MR do and why?
This change expands access permissions for a security feature called "read security attribute" and enables it by default.
Previously, only users with the highest permission levels (40 and 50, which typically correspond to maintainer and owner roles) could use this feature, and it was disabled by default. Now, users with lower permission levels (15, 20, and 30, which include planner, reporter, and developer roles) can also access this security information, and the feature is enabled automatically for all users.
Essentially, this makes security attribute information more widely accessible to team members at various permission levels, rather than restricting it to only the most privileged users.
References
Screenshots or screen recordings
| Before | After |
|---|---|
How to set up and validate locally
MR acceptance checklist
Evaluate this MR against the MR acceptance checklist. It helps you analyze changes to reduce risks in quality, performance, reliability, security, and maintainability.
Related to #578858