Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Kibana application privileges to elastic/fleet-server service account #78078

Closed
Tracked by #112648
joshdover opened this issue Sep 21, 2021 · 3 comments · Fixed by #78192
Closed
Tracked by #112648

Add Kibana application privileges to elastic/fleet-server service account #78078

joshdover opened this issue Sep 21, 2021 · 3 comments · Fixed by #78192
Assignees
Labels
>enhancement :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team

Comments

@joshdover
Copy link
Contributor

In order to support dropping the requirement to need superuser credentials to setup Fleet (elastic/kibana#112647), we'd like to leverage the elastic/fleet-server service account to be able to perform this setup. We plan to register an application privilege from Kibana that would allow us to do this, but we'll need to grant the service account access to Kibana's application privileges for this to work.

This should work very similarly to how we enable the `` user to do the same and we plan to also remove this requirement in 8.x once Kibana initiates Fleet setup without an external user:

new RoleDescriptor.ApplicationResourcePrivileges[] {
RoleDescriptor.ApplicationResourcePrivileges.builder()
.application("kibana-*").resources("*").privileges("reserved_ml_user").build()
},

In this case, we'll need to grant access to the reserved_fleet-setup privilege for the kibana-* application.

Related to #77294

@joshdover joshdover added >enhancement :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team labels Sep 21, 2021
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

@joshdover
Copy link
Contributor Author

@ywangd is this something you could handle in conjunction with #77294?

@ywangd
Copy link
Member

ywangd commented Sep 21, 2021

@ywangd is this something you could handle in conjunction with #77294?

Yes I can get this done as long as the decision is agreed upon by relevant teams. Please feel free to put me as the assignee.

The change will be its own separate PR from the one for #77294 since they are two separate issues and each has clearly defined scope.

ywangd added a commit to ywangd/elasticsearch that referenced this issue Sep 22, 2021
This PR adds necessary application privilege for Kibana to allow
fleet-server service account to initiate the Fleet setup process.

Resolves: elastic#78078
ywangd added a commit that referenced this issue Oct 6, 2021
This PR adds necessary application privilege for Kibana to allow
fleet-server service account to initiate the Fleet setup process.

Resolves: #78078
ywangd added a commit to ywangd/elasticsearch that referenced this issue Oct 6, 2021
This PR adds necessary application privilege for Kibana to allow
fleet-server service account to initiate the Fleet setup process.

Resolves: elastic#78078
elasticsearchmachine pushed a commit that referenced this issue Oct 6, 2021
This PR adds necessary application privilege for Kibana to allow
fleet-server service account to initiate the Fleet setup process.

Resolves: #78078
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
>enhancement :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants