Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Discuss] Creating new app privileges for package install #87326

Open
juliaElastic opened this issue Jun 2, 2022 · 1 comment
Open

[Discuss] Creating new app privileges for package install #87326

juliaElastic opened this issue Jun 2, 2022 · 1 comment
Labels
:Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team

Comments

@juliaElastic
Copy link
Contributor

This discussion started on the Fleet RBAC work.

@dakrone @tvernum Could provide some input here?
To summarize the situation:

  • We're currently designing the next phases of Fleet and Integration's RBAC model and we want to plan ahead enough to ensure we don't need any breaking changes to our model which would require role migrations (which don't exist).
  • We suspect that at some point, Elasticsearch will be responsible for installing packages directly (see this doc) and want to be sure that any package install privileges we introduce now could easily be adopted by Elasticsearch in the future without requiring a breaking change or role migrations.
  • In order to facilitate this, we're considering breaking out the package install privileges into a separate set of application privileges from Kibana's application privileges. See https://github.com/elastic/obs-dc-team/issues/731#issuecomment-1094658965 for details.

Questions for you all:

  • When package installation is changed to be done by Elasticsearch, would ES be able to read application privileges for a theoretical "integrations" application?
  • Aside from "is it possible", is this even a good idea from an API / design perspective?
  • Should we just assume that once package install is in Elasticsearch, that role migrations would be available as well to solve this problem? (this would create a hard dependency between these separate projects)
  • Do you have any better ideas?

Originally posted by @joshdover in https://github.com/elastic/obs-dc-team/issues/731#issuecomment-1095039629

@gwbrown gwbrown added the :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC label Jun 13, 2022
@elasticmachine elasticmachine added the Team:Security Meta label for security team label Jun 13, 2022
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
:Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team
Projects
None yet
Development

No branches or pull requests

3 participants