Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kibana-wide HTTP route authorization #121212

Open
jportner opened this issue Dec 14, 2021 · 1 comment
Open

Kibana-wide HTTP route authorization #121212

jportner opened this issue Dec 14, 2021 · 1 comment
Labels
enhancement New value added to drive a business result Feature:Security/Authorization Platform Security - Authorization impact:needs-assessment Product and/or Engineering needs to evaluate the impact of the change. Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@jportner
Copy link
Contributor

jportner commented Dec 14, 2021

Currently, consumers do not have to specify any authorization controls when registering HTTP routes.

They can optionally use API access tags (access:<tag>). Otherwise, the route will rely on the authorization checks that are automatically applied for any saved object CRUD operations or other Elasticsearch API calls with the user's credentials.

This has been a large blind spot for us, and we are seeing more consumers register routes that rely on the Kibana system user's privileges (for example, to create a data view when an app is first accessed, since the end user might not have privileges to create a data view).

We could take the following steps:

  1. Conduct an audit to determine how many routes do not have any access tags applied
  2. Require all consumers to either register at least one access tag, or explicitly opt out of using authorization

It might also be useful to provide some new mechanism to allow consumers to specify that authorization checks should be applied based on a given feature privilege, as an alternative to access tags.

Note: there are performance considerations here, any authorization check currently will rely on an extra round-trip to Elasticsearch (we don't have a way to do an authN+authZ check in a single API call)

@jportner jportner added Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! enhancement New value added to drive a business result Feature:Security/Authorization Platform Security - Authorization labels Dec 14, 2021
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@exalate-issue-sync exalate-issue-sync bot added impact:needs-assessment Product and/or Engineering needs to evaluate the impact of the change. loe:small Small Level of Effort labels Jan 24, 2022
@legrego legrego removed the loe:small Small Level of Effort label Aug 22, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New value added to drive a business result Feature:Security/Authorization Platform Security - Authorization impact:needs-assessment Product and/or Engineering needs to evaluate the impact of the change. Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

3 participants