-
Notifications
You must be signed in to change notification settings - Fork 25k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allowing the kibana system role to get/put privileges #31201
Allowing the kibana system role to get/put privileges #31201
Conversation
This is potentially dangerous if Kibana can update privileges at will. How often do we envision this having to happen? |
A discussion happened with regard to this PR in the #kibana-security Slack channel, and I've attempted to summarize and expound upon it here. The ability to PUT privileges on start-up isn't our main concern at this point, as these are only used by the Kibana application for asserting it's own access-control. The primary concern at this point is the ability for the Kibana system role to update arbitrary roles. Kibana is currently creating roles on start-up for the equivalent of the "kibana_user" and "kibana_dashboard_only_user" when the
These are the existing solutions that I've thought of, or @joshbressers proposed in the #kibana-security Slack channel.
|
Pinging @elastic/es-security |
After some discussion, we've removed the need for the Kibana system role needing to GET/PUT roles, so this only adds the ability to for the Kibana system role to GET/PUT privileges. |
dd66725
to
5e4c27e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is fine with me for the branch right now. As long as @tvernum concurs, then lets merge this as is until we figure out how we're going to limit the scope of modifying privileges.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Per @jaymode's comments, this is good for the branch but we'll need to work out the longer term plan.
For Kibana to take advantage of the application privileges, the Kibana server will need to update it's privileges when they don't exist or are different than expected. Also on start-up the Kibana server will create the equivalent of the "kibana_user" and "kibana_dashboard_only_user" roles with the appropriate "resource" when they don't exist as "non reserved roles" so that users are able to modify the privileges associated with these roles.