Allowing the kibana system role to get/put privileges#31201
Allowing the kibana system role to get/put privileges#31201kobelb merged 3 commits intoelastic:security-app-privsfrom
Conversation
|
This is potentially dangerous if Kibana can update privileges at will. How often do we envision this having to happen? |
|
A discussion happened with regard to this PR in the #kibana-security Slack channel, and I've attempted to summarize and expound upon it here. The ability to PUT privileges on start-up isn't our main concern at this point, as these are only used by the Kibana application for asserting it's own access-control. The primary concern at this point is the ability for the Kibana system role to update arbitrary roles. Kibana is currently creating roles on start-up for the equivalent of the "kibana_user" and "kibana_dashboard_only_user" when the
These are the existing solutions that I've thought of, or @joshbressers proposed in the #kibana-security Slack channel.
|
|
Pinging @elastic/es-security |
|
After some discussion, we've removed the need for the Kibana system role needing to GET/PUT roles, so this only adds the ability to for the Kibana system role to GET/PUT privileges. |
dd66725 to
5e4c27e
Compare
For Kibana to take advantage of the application privileges, the Kibana server will need to update it's privileges when they don't exist or are different than expected. Also on start-up the Kibana server will create the equivalent of the "kibana_user" and "kibana_dashboard_only_user" roles with the appropriate "resource" when they don't exist as "non reserved roles" so that users are able to modify the privileges associated with these roles.