-
Notifications
You must be signed in to change notification settings - Fork 25k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introduce reserved_ml_apm_user kibana privilege #59854
Conversation
Pinging @elastic/es-security (:Security/Authorization) |
}, null, MetadataUtils.DEFAULT_RESERVED_METADATA)) | ||
}, new RoleDescriptor.ApplicationResourcePrivileges[] { | ||
RoleDescriptor.ApplicationResourcePrivileges.builder() | ||
.application("kibana-*").resources("*").privileges("reserved_ml_apm_user").build() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Clarifying question since I'm not familiar with "reserved" privileges: I couldn't find reserved_ml_apm_user
in elastic/kibana#72266 but I did find ml_apm_user
. Is reserved_
an implied prefix somehow?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good question. Yes, the reserved_
prefix is generated by Kibana's security plugin when it "serializes" our privilege model into Elasticsearch's Application Privilege model:
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Adds a new Kibana "reserved" Kibana application privilege to the
apm_user
role, in order to grant access to a subset of ML functionality within Kibana.Previously, the
apm_user
role was authorized to retrieve ML jobs by virtue of its privileges against the.ml-anomalies*
set of indices. This access is no longer sufficient, now that the ML feature is taking advantage of the Kibana privilege model.In order to maintain BWC for existing users of the
apm_user
role, it's necessary to create a reserved privilege which mimics the previous access that this role used to have. Eventually, the Kibana privilege model will be updated to support access to ML jobs in a more holistic manner, but that is a longer term initiative.Corresponding Kibana PR: elastic/kibana#72266