9
9
[discrete]
10
10
=== Plugins
11
11
12
- Elasticsearch 's plugin infrastructure is extremely flexible in terms of what can
13
- be extended. While it opens up Elasticsearch to a wide variety of (often custom)
12
+ {es} 's plugin infrastructure is extremely flexible in terms of what can
13
+ be extended. While it opens up {es} to a wide variety of (often custom)
14
14
additional functionality, when it comes to security, this high extensibility level
15
15
comes at a cost. We have no control over the third-party plugins' code (open
16
16
source or not) and therefore we cannot guarantee their compliance with
@@ -20,7 +20,7 @@ officially supported on clusters with {security-features} enabled.
20
20
[discrete]
21
21
=== Changes in wildcard behavior
22
22
23
- Elasticsearch clusters with the {security-features} enabled apply the `/_all`
23
+ {es} clusters with the {security-features} enabled apply the `/_all`
24
24
wildcard, and all other wildcards, to the data streams, indices, and index aliases that the current user has
25
25
privileges for, not all data streams, indices, and index aliases on the cluster.
26
26
@@ -38,44 +38,43 @@ Aliases containing filters are not a secure way to restrict access to individual
38
38
documents, due to the limitations described in
39
39
<<alias-limitations, Index and field names can be leaked when using aliases>>.
40
40
The {stack-security-features} provide a secure way to restrict access to
41
- documents through the
41
+ documents through the
42
42
<<field-and-document-access-control, document-level security>> feature.
43
43
44
44
[discrete]
45
+ [[field-document-limitations]]
45
46
=== Field and document level security limitations
46
47
47
- When a user's role enables document or field level security for a data stream or index:
48
+ When a user's role enables document or << field-level-security,field level security>> for a data stream or index:
48
49
49
50
* The user cannot perform write operations:
50
51
** The update API isn't supported.
51
52
** Update requests included in bulk requests aren't supported.
52
53
* The request cache is disabled for search requests.
53
54
54
- When a user's role enables document level security for a data stream or index:
55
+ When a user's role enables << document-level-security,document level security>> for a data stream or index:
55
56
56
- * Document level security isn't applied for APIs that aren't document based.
57
- An example is the field stats API.
58
57
* Document level security doesn't affect global index statistics that relevancy
59
- scoring uses. So this means that scores are computed without taking the role
60
- query into account. Note that documents not matching with the role query are
58
+ scoring uses. This means that scores are computed without taking the role
59
+ query into account. Documents that don't match the role query are
61
60
never returned.
62
- * The `has_child` and `has_parent` queries aren't supported as query in the
63
- role definition. The `has_child` and `has_parent` queries can be used in the
64
- search API with document level security enabled.
65
- * Any query that makes remote calls to fetch data to query by isn't supported.
66
- The following queries aren 't supported:
67
- ** The `terms` query with terms lookup isn't supported.
68
- ** The `geo_shape ` query with indexed shapes isn't supported.
69
- ** The `percolate ` query isn't supported.
70
- * If suggesters are specified and document level security is enabled then
71
- the specified suggesters are ignored.
61
+ * The `has_child` and `has_parent` queries aren't supported as query parameters
62
+ in the role definition. The `has_child` and `has_parent` queries can be used in
63
+ the search API with document level security enabled.
64
+ * <<date-math,Date math>> expressions cannot contain `now` in <<ranges-on-dates,range queries with date fields>>
65
+ * Any query that makes remote calls to fetch query data isn 't supported,
66
+ including the following queries:
67
+ ** `terms ` query with terms lookup
68
+ ** `geo_shape ` query with indexed shapes
69
+ ** `percolate` query
70
+ * If suggesters are specified and document level security is enabled, the specified suggesters are ignored.
72
71
* A search request cannot be profiled if document level security is enabled.
73
72
74
73
[discrete]
75
74
[[alias-limitations]]
76
75
=== Index and field names can be leaked when using aliases
77
76
78
- Calling certain Elasticsearch APIs on an alias can potentially leak information
77
+ Calling certain {es} APIs on an alias can potentially leak information
79
78
about indices that the user isn't authorized to access. For example, when you get
80
79
the mappings for an alias with the `_mapping` API, the response includes the
81
80
index name and mappings for each index that the alias applies to.
0 commit comments