Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for composite features #96598

Open
legrego opened this issue Apr 8, 2021 · 1 comment
Open

Support for composite features #96598

legrego opened this issue Apr 8, 2021 · 1 comment
Labels
enhancement New value added to drive a business result Feature:Security/Authorization Platform Security - Authorization Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@legrego
Copy link
Member

legrego commented Apr 8, 2021

The Kibana privilege model is currently centered around two discrete concepts: Kibana Features and Elasticsearch Features.

Broadly speaking, a Kibana Feature is something that is solely within the domain of Kibana - it uses Kibana APIs and services (such as saved objects) in order to fulfill its goals.

An Elasticsearch feature is something that requires cluster or index privileges in order to function -- in other words, these features require us to proxy the end-user's credentials to Elasticsearch, as we cannot have the kibana_system user perform these operations on their behalf.

Examples of Kibana Features include:

  • Discover
  • Dashboard
  • Security Solution
  • APM
  • etc...

Examples of Elasticsearch Features include:

  • Snapshot/Restore
  • ILM Management
  • User/Role Management
  • Index Management
  • etc...

This distinction works fairly well, but we are coming across features that don't fit cleanly into either bucket. For example, the File Upload feature requires:

  1. The ability to create index patterns (a Kibana Feature)
  2. The ability to create index pipelines (an Elasticsearch Feature)
  3. The ability to create indices and index documents (an Elasticsearch Feature)

It would be nice if our feature privilege model could account for these "composite" features, which require both Kibana and Elasticsearch privileges in order to function correctly.

@legrego legrego added Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! enhancement New value added to drive a business result Feature:Security/Authorization Platform Security - Authorization labels Apr 8, 2021
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@exalate-issue-sync exalate-issue-sync bot added impact:low Addressing this issue will have a low level of impact on the quality/strength of our product. loe:small Small Level of Effort labels Aug 4, 2021
@legrego legrego removed EnableJiraSync loe:small Small Level of Effort impact:low Addressing this issue will have a low level of impact on the quality/strength of our product. labels Aug 18, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New value added to drive a business result Feature:Security/Authorization Platform Security - Authorization Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

2 participants