-
Notifications
You must be signed in to change notification settings - Fork 69
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add required roles and privileges for Fleet & Integrations (#868)
* Add required roles and privileges for Fleet & Integrations * fix * Capitalize 'Integrations' * one more... (cherry picked from commit be9a718)
- Loading branch information
1 parent
7b11463
commit fd86678
Showing
4 changed files
with
52 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
45 changes: 45 additions & 0 deletions
45
docs/en/ingest-management/security/fleet-roles-and-privileges.asciidoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
[[fleet-roles-and-privileges]] | ||
= Required roles and privileges | ||
|
||
Beginning with {stack} version 8.1, you no longer require the built-in `elastic` superuser credentials to use {fleet} and Integrations. | ||
|
||
Assigning the {kib} feature privileges `Fleet` and `Integrations` grants access to these features: | ||
|
||
`all`:: Grants full read-write access. | ||
`read`:: Grants read-only access. | ||
|
||
The built-in `editor` role grants the following privileges, supporting full read-write access to {fleet} and Integrations: | ||
|
||
* {Fleet}: `All` | ||
* Integrations: `All` | ||
|
||
The built-in `viewer` role grants the following privileges, supporting read-only access to {fleet} and Integrations: | ||
|
||
* {Fleet}:: `None` | ||
* Integrations:: `Read` | ||
|
||
You can also create a new role that can be assigned to a user to grant access to {fleet} and Integrations. | ||
|
||
[discrete] | ||
[[fleet-roles-and-privileges-create]] | ||
== Create a role for {fleet} | ||
|
||
To create a new role with full access to use and manage {fleet} and Integrations: | ||
|
||
. In {kib}, go to **Management -> Stack Management**. | ||
. In the **Security** section, select **Roles**. | ||
. Select **Create role**. | ||
. Specify a name for the role. | ||
. Leave the {es} settings at their defaults, or refer to {ref}/security-privileges.html[Security privileges] for descriptions of the available settings. | ||
. In the {kib} section, select **Add Kibana privilege**. | ||
. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users needs the {kib} privileges in all spaces. | ||
. Expand the **Management** section. | ||
. Set **Fleet** privileges to **All**. | ||
. Set **Integrations** privileges to **All**. | ||
|
||
[role="screenshot"] | ||
image::images/kibana-fleet-privileges.png[Kibana privileges flyout showing Fleet and Integrations set to All] | ||
|
||
To create a read-only user for Integrations, follow the same steps as above but set the **Fleet** privileges to **None** and the **Integrations** privileges to **Read**. | ||
|
||
Read-only access to {fleet} is not currently supported but is planned for development in a later release. |