Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Switch over to using API Keys for reporting (many open questions) #76964

Closed
tsullivan opened this issue Sep 8, 2020 · 5 comments
Closed

Switch over to using API Keys for reporting (many open questions) #76964

tsullivan opened this issue Sep 8, 2020 · 5 comments
Labels
(Deprecated) Feature:Reporting Use Reporting:Screenshot, Reporting:CSV, or Reporting:Framework instead

Comments

@tsullivan
Copy link
Member

Basic Authorization might not be successful for the scheduled reports use case. Can we use API Keys?

@tsullivan
Copy link
Member Author

A thread in this issue: #76210 finds that trying to use API Keys for Reporting will not work.

Reporting's pre-routing logic checks the current username against the roles they have in the system. For API Key users, they have no roles since all of their permissions are a snapshot of what existed when the key was created.

@tvernum
Copy link
Contributor

tvernum commented Sep 9, 2020

For API Key users, they have no roles since all of their permissions are a snapshot of what existed when the key was created.

That is an oversimpilification. An API key may have less privileges than the user had at the time it was created, which is why there is no way to use role names. For example, it is entirely valid (and expected) for a superuser to create an API key that has readonly access, which means the API key no longer has "superuser" even though the owner did (and probably still does).

@afharo afharo added (Deprecated) Feature:Reporting Use Reporting:Screenshot, Reporting:CSV, or Reporting:Framework instead Team:Reporting Services labels Sep 14, 2020
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-reporting-services (Team:Reporting Services)

@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-app-services (Team:AppServices)

@tsullivan
Copy link
Member Author

I'm going to close this issue since we can focus on #19914

Instrumenting Kibana Apps to use Feature Controls to check the reporting privilege will mean that the reporting_user role has to be deprecated. Those changes will effectively take care of this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
(Deprecated) Feature:Reporting Use Reporting:Screenshot, Reporting:CSV, or Reporting:Framework instead
Projects
None yet
Development

No branches or pull requests

4 participants