-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secure visibility of index-patterns #100974
Comments
Pinging @elastic/es-security (Team:Security) |
Do you mean Kibana index patterns, or something else? Can you provide a concrete example? |
Hi @tvernum ! Sure thing - and yes I do mean Kibana index-patterns. Let's say that we have a Role called We have a wizard user We all know how curious So it would be cool if we could hide the existence of resources that our users don't have access to. |
@derickson for visibility |
@bytebilly @tvernum |
I think it could be a problem, depending on the customer expectations about whether a user should know about the existence of a data source or not. In the example I outlined it's exposed cross-space, hence why I suggest adding the ability to put security controls on index-patterns like we would for other saved objects. |
I'm going to move this to the Would we prefer to
|
Pinging @elastic/kibana-security (Team:Security) |
This is a duplicate of #23294. Closing in favor of the original |
Thanks @legrego - sorry for he late response, didn't realize this got closed. I just did some testing on my same "Minas Tirith" cluster for this... While pushing users through the Spaces construct would work if the Space isn't shared amongst users of differing roles, and it does indeed prevent users from seeing actual data (or selecting indices they don't have access to during index_pattern creation process), it does not prevent the user from seeing index_patterns created within the same Space by another user with a different role. User |
Hey @woodywalton,
Yes, I agree. I think the issue I linked above (#23294) describes this requirement, regardless of which Space the user us currently in. Ideally we wouldn't show |
Thanks again @legrego ! |
Just the knowledge about the existence of an index-pattern can sometimes be too much information, even though RBAC prevents access of the data within the related indices. Perhaps this requires a new permission type on the ability to
list-indices
or something similar?The text was updated successfully, but these errors were encountered: