@pdonias
Thanks for the reply and clarification on this.
In our environment, we are a test environment, so we are constantly spinning up VMs on isolated networks segregated by VLANs. We have admins and we have users. Users can make VMs and make use of pretty much all the resources, but they can't create or config resources (so they pretty much have "operator" access).
However, there are resources I don't want users to have access to -- or even see even if the user is granted rights higher up in the hierarchy. I would like to see the idea of an ACL "deny" which basically punches a negative access hole in the ACL hierarchical resolution.
I foresee myself mostly using the ACLs instead of the self-service set because of how we operate and because the ACLs are more transparent and (more) dynamically adjusting (i.e. using hierarchical resolution). Coming from a VMware world, the ACL model make more sense to me and I would be able to more easily map my current permission model.
It might be nice to assign ACLs based on tags (or containers) as well. This would allow me to place certain resources into those containers/tag groups and assign ACLs based on them without considering each individual object.
In the ACL screen, right now the ACLs are individually shown. This is very noisy when you have lots of ACLs and it is hard to get a picture of the permission model. I think a reorg of how the ACL information is presented is needed to help make informed authorization decisions.