Skip to content

Change kibana_user and kibana_dashboard_only_user to use application privileges #32091

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
kobelb opened this issue Jul 16, 2018 · 4 comments
Closed
Labels
>enhancement :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC

Comments

@kobelb
Copy link
Contributor

kobelb commented Jul 16, 2018

Now that we have the application privileges in place, and we're reviewing elastic/kibana#19723 , we'll want to switch the kibana_user and kibana_dashboard_only_user roles to utilize the new application privileges and no longer have direct access to the .kibana* indices.

We'd like the kibana_user role to have the all privilege on * resources; and the kibana_dashboard_only_user role to have the read privilege on * resources.

It should be noted that we won't want to merge this change until elastic/kibana#19723 merges, or else we risk making existing users with the kibana_user roles non-functional.

@kobelb kobelb added the :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC label Jul 16, 2018
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security

@jaymode
Copy link
Member

jaymode commented Jul 16, 2018

@kobelb this will prevent users from using kibana until kibana has also been upgraded if I understand correctly. I'm just pointing this out because we'll need to document this.

@kobelb
Copy link
Contributor Author

kobelb commented Jul 16, 2018

@kobelb this will prevent users from using kibana until kibana has also been upgraded if I understand correctly. I'm just pointing this out because we'll need to document this.

That's a good point, and something we should definitely document because I can't think of a way around this.

@kobelb
Copy link
Contributor Author

kobelb commented Jul 24, 2018

Closed by #32137

@kobelb kobelb closed this as completed Jul 24, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
>enhancement :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC
Projects
None yet
Development

No branches or pull requests

4 participants