-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Controls - document limitations for kibana.defaultAppId and server.defaultRoute #46331
Comments
@iainardo, are you by chance using either of the following
If so, these settings are not (yet) capable of reading the current user's privileges, and they'll blindly redirect all users to the configured app / endpoint after logging in. |
Pinging @elastic/kibana-security |
Hi @legrego, thanks for the reply and your help on this! Yes indeed, I'm using It seems the issue I reported can be resolved (partially) by updating of kibana.yml either from: For scenarios where some users shouldn't have dashboard space privileges, I guess this configuration should be removed altogether from It would be useful if this information could make it's way into docs for others in case they come across the same issue. |
Yeah, the default landing page of We are working on adding support for space-specific default routes. This doesn't directly solve your problem, but depending on your space/user configuration, it may alleviate it somewhat.
I agree, thanks for raising this issue. I'm going to undertake an effort in the near future to improve docs for this scenario, and a couple of other cases that have come up recently around spaces and security: |
Great thanks @legrego 👍 |
@iainardo if it's alright with you, can I rename this issue to track the documentation improvements for this scenario? |
@legrego - sure absolutely! If I can help let me know. |
Thank you for contributing to this issue, however, we are closing this issue due to inactivity as part of a backlog grooming effort. If you believe this feature/bug should still be considered, please reopen with a comment. |
Edit by @legrego: Issue renamed to capture documentation updates. See comment below.
Kibana version:
7.3.0
Elasticsearch version:
7.3.0
Server OS version:
Centos 7.x
Browser version:
Google Chrome 75.0.3770.100 (Official Build) (64-bit)
Browser OS version:
Ubuntu 18.04 LTS
Original install method (e.g. download page, yum, from source, etc.):
Describe the bug:
A Kibana user with Dashboard read (or none) dashboard privileges cannot login to Kibana. An error is continually displayed in the browser.
A Kibana native user with a READONLY dashboard privileges role is being directed to
app/kibana#/dashboard
. Given the user is configured with readonly dashboard privileges they should really be directed to "app/kibana#/dashboards" ?Steps to reproduce:
foo_readonly
Kibana role (Management -> Roles)i) readonly index privileges to 'foo-*' indexes
ii) for the
foo
space create a role with Read privilege access all space features (Discover, Visualise, Dashboard etc..)foo_user
that uses thefoo_readonly
role create above (Management -> Users)foo_user
Expected behavior:
dashboards
page.Screenshots (if relevant):
app/kibana#/dashboard
page (which they don't have permissions to access - as they have READONLY dashboard permissions)Errors in browser console (if relevant):
Provide logs and/or server output (if relevant):
Any additional context:
../app/kibana#/dashboard
page (which it seems they shouldn't have permissions to access - as they have READONLY dashboard permissions) ?dashboard
todashboards
login is successful and dashboards are displayed as expected.NONE
is used as the privilege for Dashboard, so it would seem a user with an association to such a role cannot login.The text was updated successfully, but these errors were encountered: