-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[APM] Audit non authorized endpoints and Authz migration #206252
Comments
Pinging @elastic/obs-ux-infra_services-team (Team:obs-ux-infra_services) |
I couldn't find any reasons for these routes not to have any authorization defined.
|
Thanks for the input @crespocarlos, It's okay not to add authentication to the endpoints, but we should document a valid reason in the code, as that's the expected change here:
So we could have sth like this:
@crespocarlos does that make sense? If I understood correctly, there are no security issues with the first two endpoints, so if we decide to add access tags for consistency, we can do that later. |
Great, thank you @crespocarlos! For the sake of having this ready before the January 31, 2025 deadline, I propose keeping the current state of If you agree with it I'll proceed and add the reasoning to all 3 endpoints. |
## Summary Closes #206252 As part of the Authz migration, we updated the endpoints that didn’t have any authorization restrictions to match the [documentation](https://docs.elastic.dev/kibana-dev-docs/key-concepts/security-api-authorization#opting-out-of-authorization-for-specific-routes) requirements.
## Summary Closes elastic#206252 As part of the Authz migration, we updated the endpoints that didn’t have any authorization restrictions to match the [documentation](https://docs.elastic.dev/kibana-dev-docs/key-concepts/security-api-authorization#opting-out-of-authorization-for-specific-routes) requirements. (cherry picked from commit b328fe8)
## Summary Closes elastic#206252 As part of the Authz migration, we updated the endpoints that didn’t have any authorization restrictions to match the [documentation](https://docs.elastic.dev/kibana-dev-docs/key-concepts/security-api-authorization#opting-out-of-authorization-for-specific-routes) requirements.
Summary
As part of the Authz migrations, we need to handle endpoints that are not using any authorization.
/internal/apm/fleet/has_apm_policies
/internal/apm/fleet/agents
/internal/apm/fleet/java_agent_versions
They are not using any access tags, so we should audit them:
Important
Deadline January 31, 2025
The text was updated successfully, but these errors were encountered: