Support for composite features #96598
Labels
enhancement
New value added to drive a business result
Feature:Security/Authorization
Platform Security - Authorization
Team:Security
Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
unified-security-painpoint
Highlights issues that are painpoints as a result of the lack of a unified security model
The Kibana privilege model is currently centered around two discrete concepts: Kibana Features and Elasticsearch Features.
Broadly speaking, a Kibana Feature is something that is solely within the domain of Kibana - it uses Kibana APIs and services (such as saved objects) in order to fulfill its goals.
An Elasticsearch feature is something that requires
cluster
orindex
privileges in order to function -- in other words, these features require us to proxy the end-user's credentials to Elasticsearch, as we cannot have thekibana_system
user perform these operations on their behalf.Examples of Kibana Features include:
Examples of Elasticsearch Features include:
This distinction works fairly well, but we are coming across features that don't fit cleanly into either bucket. For example, the File Upload feature requires:
It would be nice if our feature privilege model could account for these "composite" features, which require both Kibana and Elasticsearch privileges in order to function correctly.
The text was updated successfully, but these errors were encountered: