You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/api/role-management/put.asciidoc
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,8 @@ The following parameters can be specified in the body of a PUT request to add or
28
28
that begin with `_` are reserved for system usage.
29
29
30
30
`elasticsearch`:: (object) Optional {es} cluster and index privileges, valid keys are
31
-
`cluster`, `indices` and `run_as`. For more information, see {xpack-ref}/defining-roles.html[Defining Roles].
31
+
`cluster`, `indices` and `run_as`. For more information, see
32
+
{ref}/defining-roles.html[Defining roles].
32
33
33
34
`kibana`:: (object) An object that specifies the <<kibana-privileges>>. Valid keys are `global` and `space`. Privileges defined in the `global` key will apply to all spaces within Kibana, and will take precedent over any privileges defined in the `space` key. For example, specifying `global: ["all"]` will grant full access to all spaces within Kibana, even if the role indicates that a specific space should only have `read` privileges.
Copy file name to clipboardExpand all lines: docs/developer/security/rbac.asciidoc
+8-1Lines changed: 8 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,14 @@
1
1
[[development-security-rbac]]
2
2
=== Role-based access control
3
3
4
-
Role-based access control (RBAC) in {kib} relies upon the {xpack-ref}/security-privileges.html#application-privileges[application privileges] that Elasticsearch exposes. This allows {kib} to define the privileges that {kib} wishes to grant to users, assign them to the relevant users using roles, and then authorize the user to perform a specific action. This is handled within a secured instance of the `SavedObjectsClient` and available transparently to consumers when using `request.getSavedObjectsClient()` or `savedObjects.getScopedSavedObjectsClient()`.
4
+
Role-based access control (RBAC) in {kib} relies upon the
Copy file name to clipboardExpand all lines: docs/management/dashboard_only_mode/advanced_configuration.asciidoc
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,8 @@ To grant read-only access to your custom {kib} instance,
19
19
you must assign the read <<kibana-privileges, Kibana privilege>>.
20
20
These privileges are available under *Management > Security > Roles*.
21
21
22
-
For more information on roles and privileges, see {xpack-ref}/authorization.html[User Authorization].
22
+
For more information on roles and privileges, see
23
+
{ref}/authorization.html[User authorization].
23
24
24
25
[role="screenshot"]
25
26
image:management/dashboard_only_mode/images/custom_dashboard_mode_role.png["Custom dashboard mode role with read permissions on a custom kibana index"]
0 commit comments