-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Saved object authorization - Phase 1 #4453
Comments
+1 |
tbragin: you mentioned a workaround using multiple kibana instances. that would work for me as i only have two groups. one gets full access, the other would be limited to certain types of logs such as access logs. for this setup, would i need to save access logs to an additional index that the second kibana instance connects points to? |
Does this approach works with Shield? Currently we use multiple Kibana instances with different .kibana-index to split our groups. |
via @dannymeijer in #4714 In our use-case we are looking to start deploying Kibana to a very broad user base. To prevent issues with people 'accidentally' breaking something for someone else (for example, deleting someone else's dashboard) we want to be able to define authorization levels. I was thinking something like this (as an example): A regular user: Another example of this is visualizations. I don't want regular users to create and store visualizations (they are just stopping by to check out content that is already there) - but disabling the visualization plugin will not just remove the visualizations tab; it completely disables all and every visualizations. I hope I was extensive enough with examples to portray what I am talking about. The solution I had in mind would involve having the ability to customize in a more detailed level what users are presented with, maybe in the form of tags or buckets that you can predefine. A requirement for this to work is obviously that the authentication framework is in place (issue #3904 / #4419 / #4634). |
+1 If this can be tied to LDAP/AD where we already have different groups defined, that would be very nice. |
+1 |
+1 |
+1 |
8 similar comments
+1 |
+1 |
+1 |
+1 |
+1 |
+1 |
+1 |
+1 |
+1!! |
+1 |
Hi all, could be this a possible solution? I used 5.2.0 version. In Kibana-Management-Users, create an user (user1) and specific role for this user (role1). This user only must have access to the index "example-*", and only their visualizations, dashboards, searches... == ROLE1 == Name: Role1 | Indices: example-* | Indices: .kibana
You can create a neutral default index empty for all users. PUT /start Regards |
Any updates on this ? |
+1 |
плюс один |
Well I like the solution but facing some issue. Extremely sorry that I am asking query here . | Indices: .kibana_management
With above I cannot see data/document in the discover page, however with elastic user who created this index (management) can see the document/data in the discover page . FYI i have merged both above settings in a single role only also here ID is my visualization ID even this is not showing any data. |
+1 |
+1 |
Apache Shiro inspired me to create Rushiro https://github.com/guyboertje/rushiro for an e-commerce Rails platform that I worked on a few years back. From what I have seen of the AWS permission system, it too is inspired by Shiro. ------ extract One suggestion might be: Domain|Action|Instance
example: this hash is processed into a hierarchy of objects perm = {
allows: {
individual: [
"feature|create,read,update|feat-x",
"page|*|posts",
"company|read"
"company|update|5b90a720-e6b0-012e-dc18-782bcb979e60"
],
organization: [],
system: []
},
denies: {}
}
access_control = AllowBasedControl.new(perm)
access_control.permitted?("company|read|5b90a720-e6b0-012e-dc18-782bcb979e60") ==> true
access_control.permitted?("feature|delete|feat-x") ==> false ------ extract |
Hi @tbragin |
What is the issue # in GitHub to enhance kibana to provide real fine grained access to kibana objects (where some users will have read, others can have full access) based on roles/group memebership? I can't find any. If that issue doesn't exist yet, it should. The approach used in this issue with tags that you can assign to objects still gives all users with that tag the same access level (full access) - not what a lot of people want. Thanks. |
Best solution I found so far regarding this issue: |
+1 |
1 similar comment
+1 |
+1 |
1 similar comment
+1 |
Our company has figured out how to solve this problem: give up on ELK and just use Splunk. ELK is fine for a few people on a close-knit team but Splunk has way better user account-related functionality for a larger team or multiple teams. |
+1 |
1 similar comment
+1 |
+1, would love to see this feature be implemented in any proper form! |
+1 but three years in and I don't believe anything has been done on this front? We want to give outside access to our Kibana instance but fine grained access to dashboards is a MUST. Even internally this is kind of a necessity and I suppose that goes for everyone using Kibana outside of a small team. |
cc @elastic/kibana-security please feel free to close and refer to a more up to date issue, if there is any |
Superseded by #18473 |
Currently, Kibana does not support any fine-grained access control in the UI, so all dashboards, visualizations, and saved searches are available to every authenticated user. This may present a problem when Kibana is used by multiple groups that wish to share a single Kibana instance and restrict who can see each of these saved objects.
To be clear, a reasonable workaround at this time is to set up multiple Kibana instances, one per group. However, as the number of groups gets large and dynamic, this may not be an ideal approach.
Here we propose an initial cut at proposed functionality and workflow for sharing one Kibana instance among multiple groups with different access rights. At a high-level this enhancement will allow for two things:
From an interaction perspective, we propose to explore using the concept of object tags to group Kibana objects (#1052).
When a user creates a new object and does not assign a tag to it, the “everyone” tag is automatically assigned and the object is visible to everyone
Out of scope for this phase:
Related issues: #1559, #3904
The text was updated successfully, but these errors were encountered: