@@ -21,12 +21,12 @@ Privileges to list and view details on existing repositories and snapshots.
2121
2222`manage`::
2323Builds on `monitor` and adds cluster operations that change values in the cluster.
24- This includes snapshotting, updating settings, and rerouting. It also includes
25- obtaining snapshot and restore status. This privilege does not include the
24+ This includes snapshotting, updating settings, and rerouting. It also includes
25+ obtaining snapshot and restore status. This privilege does not include the
2626ability to manage security.
2727
2828`manage_api_key`::
29- All security-related operations on {es} API keys including
29+ All security-related operations on {es} API keys including
3030<<security-api-create-api-key,creating new API keys>>,
3131<<security-api-get-api-key,retrieving information about API keys>>, and
3232<<security-api-invalidate-api-key,invalidating API keys>>.
@@ -45,10 +45,10 @@ owned by other users.
4545--
4646
4747`manage_ccr`::
48- All {ccr} operations related to managing follower indices and auto-follow
49- patterns. It also includes the authority to grant the privileges necessary to
50- manage follower indices and auto-follow patterns. This privilege is necessary
51- only on clusters that contain follower indices.
48+ All {ccr} operations related to managing follower indices and auto-follow
49+ patterns. It also includes the authority to grant the privileges necessary to
50+ manage follower indices and auto-follow patterns. This privilege is necessary
51+ only on clusters that contain follower indices.
5252
5353`manage_transform`::
5454All operations related to managing {transforms}.
@@ -83,7 +83,7 @@ to initiate and manage OpenID Connect authentication on behalf of other users.
8383
8484`manage_own_api_key`::
8585All security-related operations on {es} API keys that are owned by the current
86- authenticated user. The operations include
86+ authenticated user. The operations include
8787<<security-api-create-api-key,creating new API keys>>,
8888<<security-api-get-api-key,retrieving information about API keys>>, and
8989<<security-api-invalidate-api-key,invalidating API keys>>.
@@ -119,7 +119,7 @@ security roles of the user who created or updated them.
119119--
120120
121121`monitor`::
122- All cluster read-only operations, like cluster health and state, hot threads,
122+ All cluster read-only operations, like cluster health and state, hot threads,
123123node info, node and cluster stats, and pending cluster tasks.
124124
125125`monitor_transform`::
@@ -131,16 +131,16 @@ model snapshots, or results.
131131
132132`monitor_rollup`::
133133All read-only rollup operations, such as viewing the list of historical and
134- currently running rollup jobs and their capabilities.
134+ currently running rollup jobs and their capabilities.
135135
136136`monitor_watcher`::
137137All read-only watcher operations, such as getting a watch and watcher stats.
138138
139139`read_ccr`::
140- All read-only {ccr} operations, such as getting information about indices and
141- metadata for leader indices in the cluster. It also includes the authority to
142- check whether users have the appropriate privileges to follow leader indices.
143- This privilege is necessary only on clusters that contain leader indices.
140+ All read-only {ccr} operations, such as getting information about indices and
141+ metadata for leader indices in the cluster. It also includes the authority to
142+ check whether users have the appropriate privileges to follow leader indices.
143+ This privilege is necessary only on clusters that contain leader indices.
144144
145145`read_ilm`::
146146All read-only {Ilm} operations, such as getting policies and checking the
@@ -204,15 +204,19 @@ Privilege to delete an index.
204204Privilege to index and update documents. Also grants access to the update
205205mapping action.
206206
207+ `maintenance`::
208+ Permits refresh, flush, synced flush and force merge index administration operations.
209+ No privilege to read or write index data or otherwise manage the index.
210+
207211`manage`::
208212All `monitor` privileges plus index administration (aliases, analyze, cache clear,
209213close, delete, exists, flush, mapping, open, force merge, refresh, settings,
210214search shards, templates, validate).
211215
212216`manage_follow_index`::
213217All actions that are required to manage the lifecycle of a follower index, which
214- includes creating a follower index, closing it, and converting it to a regular
215- index. This privilege is necessary only on clusters that contain follower indices.
218+ includes creating a follower index, closing it, and converting it to a regular
219+ index. This privilege is necessary only on clusters that contain follower indices.
216220
217221`manage_ilm`::
218222All {Ilm} operations relating to managing the execution of policies of an index
@@ -225,7 +229,7 @@ includes <<ccr-post-forget-follower,forgetting a follower>>. This
225229privilege is necessary only on clusters that contain leader indices.
226230
227231`monitor`::
228- All actions that are required for monitoring (recovery, segments info, index
232+ All actions that are required for monitoring (recovery, segments info, index
229233stats and status).
230234
231235`read`::
@@ -258,14 +262,14 @@ sequence.) For more information, see
258262[[application-privileges]]
259263==== Application privileges
260264
261- Application privileges are managed within {es} and can be retrieved with the
262- <<security-api-has-privileges,has privileges API>> and the
263- <<security-api-get-privileges,get application privileges API>>. They do
264- not, however, grant access to any actions or resources within {es}. Their
265- purpose is to enable applications to represent and store their own privilege
266- models within {es} roles.
267-
268- To create application privileges, use the
269- <<security-api-put-privileges,add application privileges API>>. You can
270- then associate these application privileges with roles, as described in
271- <<defining-roles>>.
265+ Application privileges are managed within {es} and can be retrieved with the
266+ <<security-api-has-privileges,has privileges API>> and the
267+ <<security-api-get-privileges,get application privileges API>>. They do
268+ not, however, grant access to any actions or resources within {es}. Their
269+ purpose is to enable applications to represent and store their own privilege
270+ models within {es} roles.
271+
272+ To create application privileges, use the
273+ <<security-api-put-privileges,add application privileges API>>. You can
274+ then associate these application privileges with roles, as described in
275+ <<defining-roles>>.
0 commit comments