[Breaking change] Provide sensible defaults for xpack.security.session.{lifespan|idleTimeout}
#81747
Labels
Breaking Change
Feature:Upgrade Assistant
NeededFor:Security
Team:Security
Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Change description
Which release will ship the breaking change?
8.0
Describe the change. How will it manifest to users?
When security is enabled, the default behavior is to create sessions without an idle timeout or a lifetime. This means that once a user is logged in, their session will remain active until they manually log out, or clear their browser session.
As discussed in #68885, we would like to change the default configuration to provide sensible defaults so that all sessions will have both an idle timeout and a lifespan.
How many users will be affected?
Users who do not specify their own
xpack.security.session.idleTimeout
orxpack.security.session.lifespan
will suddenly find themselves with our defaults applied. If they wish to restore the existing behavior, then they will need to adjust theirkibana.yml
manually.What can users do to address the change manually?
Update their
kibana.yml
to adjust the session timeout/lifespanHow could we make migration easier with the Upgrade Assistant?
I don't think this is something that warrants a custom UI, but having the deprecation warning appear in the UA would be beneficial.
Are there any edge cases?
Test Data
Provide test data. We can’t build a solution without data to test it against.
Cross links
Cross-link to relevant Elasticsearch breaking changes.
xpack.security.session.{lifespan|idleTimeout}
#68885The text was updated successfully, but these errors were encountered: