-
Notifications
You must be signed in to change notification settings - Fork 25.6k
Deprecating kibana_user and kibana_dashboard_only_user roles #46456
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 5 commits
b2b1bf4
65d312a
44a8e2e
503ce9a
e964b06
d25f59a
a0dc610
98aa9fb
26c189e
44982a5
07aabc3
9417850
11df36b
250ec8f
1fcba52
a9502e0
df4c6e5
459c06c
54112e0
0a8f642
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -419,14 +419,14 @@ through either the | |
| NOTE: You cannot use {stack-ov}/mapping-roles.html#mapping-roles-file[role mapping files] | ||
| to grant roles to users authenticating via OpenID Connect. | ||
|
|
||
| This is an example of a simple role mapping that grants the `kibana_user` role | ||
| This is an example of a simple role mapping that grants the `kibana_admin` role | ||
| to any user who authenticates against the `oidc1` OpenID Connect realm: | ||
|
|
||
| [source,console] | ||
| -------------------------------------------------- | ||
| PUT /_security/role_mapping/oidc-kibana | ||
| { | ||
| "roles": [ "kibana_user" ], | ||
| "roles": [ "kibana_admin" ], | ||
|
||
| "enabled": true, | ||
| "rules": { | ||
| "field": { "realm.name": "oidc1" } | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -636,14 +636,14 @@ through either the | |
| NOTE: You cannot use {stack-ov}/mapping-roles.html#mapping-roles-file[role mapping files] | ||
| to grant roles to users authenticating via SAML. | ||
|
|
||
| This is an example of a simple role mapping that grants the `kibana_user` role | ||
| This is an example of a simple role mapping that grants the `kibana_admin` role | ||
| to any user who authenticates against the `saml1` realm: | ||
|
|
||
| [source,console] | ||
| -------------------------------------------------- | ||
| PUT /_security/role_mapping/saml-kibana | ||
| { | ||
| "roles": [ "kibana_user" ], | ||
| "roles": [ "kibana_admin" ], | ||
|
||
| "enabled": true, | ||
| "rules": { | ||
| "field": { "realm.name": "saml1" } | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does filebeat need to connect as
kibana_adminor would a less privileged role suffice ?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@legrego What's our recommendation here? What privileges does filebeat need in order to use the Kibana API to setup dashboards etc?