-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Evolving Kibana's authorization model #95513
Comments
Pinging @elastic/kibana-security (Team:Security) |
I updated the description a bit and added a |
Thanks, @mikecote -- are you aware of the requirements for the potential future usages? That would be really helpful to make sure we're building something that'll actually meet our needs of tomorrow. |
@legrego the main pattern I see for the potential future usages is to have a single saved object type serve multiple features and limit access based on the inherited feature on a per-document basis. I'll put some examples below, but @ppisljar and @Bamieh keep me honest on my speculation:
|
at the moment we don't plan to make background searches accessible to other users (apart from the one creating it) but i agree that would make a lot of sense with reporting. |
(not sure if this is directly related to this issue, but) @legrego following up on #95058 (comment), one other improvement would be to allow plugins to register feature capabilities without being forced to impact the |
@pgayvallet I think the changes necessary to evolve Kibana's authorization model will require a more robust |
At the request of @azasypkin, I'll explain the limitation we ran into with the superuser role in Security Solution for serverless: We set up the Kibana features configuration to register dynamically based on the type of product being used (like Essentials or Complete). So, some features and action privileges don't get registered in Kibana when using the "Essentials tier," for example. Consequently, we expected the Elasticsearch However, we later found out that This was breaking our checks for product features when accessed by these In the end, we implemented a workaround on the Security Solution side by verifying if the privilege or action to check exists in the config object we registered as Kibana features, before calling the |
Kibana authorization model was built in a much simpler time. Our needs are growing more sophisticated by the day, and our authorization model has not kept pace with the needs of our solutions.
all
/read
: "Actions & Connectors" users are surprised by the fact that users with read-only permissions can test connectors and execute actions #105512As a result of these limitations, solution teams have had to implement their own RBAC using our security primitives, which weren't originally designed for such broad consumption. We need to evolve our security model so that solution teams don't need to write their own authorization logic.
Known usages of custom authorization:
Potential future usages of custom authorization:
The text was updated successfully, but these errors were encountered: