-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve documentation for kibana_user role assignment #26819
Comments
Pinging @elastic/kibana-security |
#26652 will help with this |
I think the description of the built-in |
Agreed, I thought we'd revised the terminology used here previously, but I must be mis-remembering.
For getting started, it's fine to use the #25722 provides a bit of context around our future direction for these two roles. Apologies for letting the stack docs get so out of date. |
Thanks for the information @kobelb ! If you are willing to create the PR, that's great. I'm happy to review or add suggestions. No worries about the delay--I just wanted to put a pin in them when I stumbled across them while making other updates. |
You got it! I'll get a PR together for this. |
Kibana version: >= 6.5
We have historically taught our users that they need to assign the
kibana_user
role to all users who wish to access Kibana. With the introduction of Spaces and other RBAC initiatives, this is no longer the case.The
kibana_user
role is now a Kibana superuser role of sorts, because it allows read/write access to all spaces, and it also grants the ability to manage spaces themselves.Administrators who wish to secure access to specific spaces should not be assigning the
kibana_user
role to their end users anymore, but instead create custom roles that are tailored to their needs.The text was updated successfully, but these errors were encountered: