-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use kibana_system user to create API keys on behalf of other users. #49398
Comments
Pinging @elastic/kibana-stack-services (Team:Stack Services) |
The kibana_system user should also be the user invalidating API keys. Currently we use the new API key owner's credentials to invalidate an API key (that could belong to someone else). |
Pinging @elastic/kibana-security (Team:Security) |
According to elastic/elasticsearch#52886 and elastic/elasticsearch#48716, the security plugin will need to extract the user's credentials ( |
It looks like there's some work we can get a head start on now that elastic/elasticsearch#52886 is merged and more PRs coming (ex: elastic/elasticsearch#53527). I think the last piece missing will be the Removing |
This needs to wait until elastic/elasticsearch#48716 is finished. Currently users require
manage_api_key
privilege when using alerting with security enabled.The text was updated successfully, but these errors were encountered: