Skip to content

Commit 8afea9c

Browse files
Merge branch '6.8' into backport/6.8/pipeline-updates
2 parents 1b8bf51 + 1f55188 commit 8afea9c

33 files changed

+72
-61
lines changed

docs/CHANGELOG.asciidoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2990,7 +2990,7 @@ Visualizations::
29902990
Watcher::
29912991
* Removed error messages that were appearing when you created an email action
29922992
for a watch without a body or subject. For more information, see
2993-
{stack-ov}/actions-email.html[Email Action].
2993+
{ref}/actions-email.html[Email action].
29942994

29952995
[[release-notes-6.1.0]]
29962996
== {kib} 6.1.0
@@ -3095,8 +3095,8 @@ Security::
30953095
* Added `manage_index_templates` cluster privileges to the `kibana_system` role,
30963096
which enables the {kib} system user to create and manage the index template for
30973097
the `.kibana` index. For more information, see
3098-
{stack-ov}/security-privileges.html[Security Privileges] and
3099-
{stack-ov}/built-in-roles.html[Built-in Roles].
3098+
{ref}/security-privileges.html[Security privileges] and
3099+
{ref}/built-in-roles.html[Built-in roles].
31003100

31013101
Sharing::
31023102
* Add a feature for custom panel titles {pull}14831[#14831]
@@ -3272,7 +3272,7 @@ Security::
32723272
* The built-in users (`elastic`, `kibana`, and `logstash_system`) no longer have
32733273
default passwords. You must create passwords for these users and configure {kib}
32743274
to use this information. For more information, see
3275-
{stack-ov}/setting-up-authentication.html[Setting Up User Authentication].
3275+
{ref}/setting-up-authentication.html[User authentication].
32763276

32773277
Watcher::
32783278
* The built-in HTTP client used in webhooks, the http input and the http email attachment has been replaced.

docs/api/role-management/put.asciidoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,8 @@ The following parameters can be specified in the body of a PUT request to add or
2828
that begin with `_` are reserved for system usage.
2929

3030
`elasticsearch`:: (object) Optional {es} cluster and index privileges, valid keys are
31-
`cluster`, `indices` and `run_as`. For more information, see {xpack-ref}/defining-roles.html[Defining Roles].
31+
`cluster`, `indices` and `run_as`. For more information, see
32+
{ref}/defining-roles.html[Defining roles].
3233

3334
`kibana`:: (object) An object that specifies the <<kibana-privileges>>. Valid keys are `global` and `space`. Privileges defined in the `global` key will apply to all spaces within Kibana, and will take precedent over any privileges defined in the `space` key. For example, specifying `global: ["all"]` will grant full access to all spaces within Kibana, even if the role indicates that a specific space should only have `read` privileges.
3435

docs/developer/security/rbac.asciidoc

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,14 @@
11
[[development-security-rbac]]
22
=== Role-based access control
33

4-
Role-based access control (RBAC) in {kib} relies upon the {xpack-ref}/security-privileges.html#application-privileges[application privileges] that Elasticsearch exposes. This allows {kib} to define the privileges that {kib} wishes to grant to users, assign them to the relevant users using roles, and then authorize the user to perform a specific action. This is handled within a secured instance of the `SavedObjectsClient` and available transparently to consumers when using `request.getSavedObjectsClient()` or `savedObjects.getScopedSavedObjectsClient()`.
4+
Role-based access control (RBAC) in {kib} relies upon the
5+
{ref}/security-privileges.html#application-privileges[application privileges]
6+
that Elasticsearch exposes. This allows {kib} to define the privileges that
7+
{kib} wishes to grant to users, assign them to the relevant users using roles,
8+
and then authorize the user to perform a specific action. This is handled within
9+
a secured instance of the `SavedObjectsClient` and available transparently to
10+
consumers when using `request.getSavedObjectsClient()` or
11+
`savedObjects.getScopedSavedObjectsClient()`.
512

613
[[development-rbac-privileges]]
714
==== {kib} Privileges

docs/getting-started/tutorial-load-dataset.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ and whether it's _tokenized_, or broken up into separate words.
6565

6666
NOTE: If security is enabled, you must have the `all` Kibana privilege to run this tutorial.
6767
You must also have the `create`, `manage` `read`, `write,` and `delete`
68-
index privileges. See {xpack-ref}/security-privileges.html[Security Privileges]
68+
index privileges. See {ref}/security-privileges.html[Security privileges]
6969
for more information.
7070

7171
In Kibana *Dev Tools > Console*, set up a mapping for the Shakespeare data set:

docs/getting-started/tutorial-sample-data.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,6 @@ In this tutorial, you’ll learn to:
2626
* Inspect the data behind the scenes
2727

2828
NOTE: If security is enabled, you must have `read`, `write`, and `manage` privileges
29-
on the `kibana_sample_data_*` indices. See {xpack-ref}/security-privileges.html[Security Privileges]
30-
for more information.
29+
on the `kibana_sample_data_*` indices. See
30+
{ref}/security-privileges.html[Security privileges] for more information.
3131

docs/limitations.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@
1111

1212
These {stack} features also have limitations that affect {kib}:
1313

14-
* {stack-ov}/watcher-limitations.html[Alerting]
14+
* {ref}/watcher-limitations.html[Alerting]
1515
* {stack-ov}/ml-limitations.html[Machine learning]
16-
* {stack-ov}/security-limitations.html[Security]
16+
* {ref}/security-limitations.html[Security]
1717

1818
--
1919

docs/management/dashboard_only_mode/advanced_configuration.asciidoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@ To grant read-only access to your custom {kib} instance,
1919
you must assign the read <<kibana-privileges, Kibana privilege>>.
2020
These privileges are available under *Management > Security > Roles*.
2121

22-
For more information on roles and privileges, see {xpack-ref}/authorization.html[User Authorization].
22+
For more information on roles and privileges, see
23+
{ref}/authorization.html[User authorization].
2324

2425
[role="screenshot"]
2526
image:management/dashboard_only_mode/images/custom_dashboard_mode_role.png["Custom dashboard mode role with read permissions on a custom kibana index"]

docs/management/dashboard_only_mode/index.asciidoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@ what users see when they log in to {kib}. The `kibana_dashboard_only_user` role
77
preconfigured with read-only permissions to {kib}.
88

99
IMPORTANT: You must also assign roles that grant the user appropriate access to the data indices.
10-
For information on roles and privileges, see {xpack-ref}/authorization.html[User Authorization].
10+
For information on roles and privileges, see
11+
{ref}/authorization.html[User authorization].
1112

1213
Users assigned this role are only able to see the Dashboard app in the navigation
1314
pane. When users open a dashboard, they will have a limited visual experience.

docs/management/managing-indices.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ To access this feature, go to *Management > {es} > Index Management*.
1212
If security is enabled,
1313
you must have the `monitor` cluster privilege and the `view_index_metadata`
1414
and `manage` index privileges to view the data. See
15-
{xpack-ref}/security-privileges.html[Security Privileges] for more
15+
{ref}/security-privileges.html[Security privileges] for more
1616
information.
1717

1818
*Index Management* uses badges to make users aware when an index is {ref}/frozen-indices.html[frozen],

docs/management/managing-licenses.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,4 @@ license, extend the trial, or purchase a subscription.
2525

2626
TIP: If {security-features} are enabled, before you revert to a Basic license or install
2727
a Gold or Platinum license, you must configure Transport Layer Security (TLS) in {es}.
28-
See {stack-ov}/encrypting-communications.html[Encrypting communications].
28+
See {ref}/encrypting-communications.html[Encrypting communications].

0 commit comments

Comments
 (0)