Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable elastic user in development #52036

Open
kobelb opened this issue Dec 2, 2019 · 1 comment
Open

Disable elastic user in development #52036

kobelb opened this issue Dec 2, 2019 · 1 comment
Labels
chore Feature:Hardening Harding of Kibana from a security perspective Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects

Comments

@kobelb
Copy link
Contributor

kobelb commented Dec 2, 2019

Using the elastic user for development is super common. #48247 barred developers from running the Kibana server as the elastic user. However, it's still possible to login to Kibana using the elastic user.

When running KIbana in development mode, we can automatically create a user and role before disabling the elastic user and requiring the custom user/role be used instead.

This can be further elaborated upon by allowing developers to specify their own users/roles they'd like to be created in a dotfile. The APM team has created something along these lines to automatically create the various "archetypes" they plan to manually test their application with: https://github.com/elastic/kibana/blob/f7f72cb737e03b0c5b12af7f3d89f03bc34fba31/x-pack/legacy/plugins/apm/scripts/kibana-security/setup-custom-kibana-user-role.ts

Initially, I was thinking that this could be part of yarn run es. However, this introduces some complexities... Ideally, we'd be using the Kibana Role Management APIs, but these aren't available until Kibana has fully started up. Additionally, APM uses a Cloud environment and doesn't use yarn run es at all. The other obvious candidate is to add this to node ./scripts/kibana.js --dev, but something about that approach feels off since we normally don't do this type of operation there.

@kobelb kobelb added the Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! label Dec 2, 2019
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@kobelb kobelb added the chore label Dec 2, 2019
@kobelb kobelb added this to Backlog in Security Dec 5, 2019
@exalate-issue-sync exalate-issue-sync bot added impact:low Addressing this issue will have a low level of impact on the quality/strength of our product. loe:small Small Level of Effort labels Aug 5, 2021
@legrego legrego removed EnableJiraSync loe:small Small Level of Effort impact:low Addressing this issue will have a low level of impact on the quality/strength of our product. labels Aug 18, 2022
@legrego legrego added the Feature:Hardening Harding of Kibana from a security perspective label Jan 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
chore Feature:Hardening Harding of Kibana from a security perspective Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
No open projects
Security
Backlog
Development

No branches or pull requests

3 participants