-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Switch over to using API Keys for reporting (many open questions) #76964
Comments
A thread in this issue: #76210 finds that trying to use API Keys for Reporting will not work. Reporting's pre-routing logic checks the current username against the roles they have in the system. For API Key users, they have no roles since all of their permissions are a snapshot of what existed when the key was created. |
That is an oversimpilification. An API key may have less privileges than the user had at the time it was created, which is why there is no way to use role names. For example, it is entirely valid (and expected) for a |
Pinging @elastic/kibana-reporting-services (Team:Reporting Services) |
Pinging @elastic/kibana-app-services (Team:AppServices) |
I'm going to close this issue since we can focus on #19914 Instrumenting Kibana Apps to use Feature Controls to check the reporting privilege will mean that the |
Basic Authorization might not be successful for the scheduled reports use case. Can we use API Keys?
The text was updated successfully, but these errors were encountered: