Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

License expiration for security features #74646

Open
legrego opened this issue Aug 10, 2020 · 3 comments
Open

License expiration for security features #74646

legrego opened this issue Aug 10, 2020 · 3 comments
Labels
enhancement New value added to drive a business result Feature:License Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@legrego
Copy link
Member

legrego commented Aug 10, 2020

Many of our security features are available for free under Elastic's Basic License, but some of the more complex or esoteric features are only available under a paid license.

We have historically been lenient at best, and inconsistent at worst when licenses expire. We should research and remediate any shortcomings we have with respect to license enforcement. Specifically:

  1. When a license expires, ensure that all features licensed under our Basic (free) tier continue to function without restrictions.
    a) User Management
    b) Role Management, without sub-feature privileges
    c) Authentication via our basic and token auth providers
  2. When a license expires, ensure that all paid features stop working. This includes, but is not limited to the following:
    a) Paid authentication providers (SAML, OIDC, Kerberos, PKI). It might suffice to rely on Elasticsearch for this check, although a better UX would be to mark them as disabled in the access agreement login selector UI. See also Better error handling when SAML realm is not available under current license #60337, SAML config - error message displayed when a license which is any less than platinum is applied, can be improved.  #34592
    b) Access Agreement UI: should no longer be part of the login flow
    c) Sub-feature privileges: should no longer be configurable. I believe this is already resolved, just mentioning it for completeness
    d) Role Mappings UI: should no longer be visible under the Stack Management application. I believe this is already resolved, just mentioning it for completeness
@legrego legrego added Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! Feature:License labels Aug 10, 2020
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@azasypkin
Copy link
Member

a) Paid authentication providers (SAML, OIDC, Kerberos, PKI). It might suffice to rely on Elasticsearch for this check, although a better UX would be to mark them as disabled in the access agreement UI. See also #60337, #34592

That's a good idea (assuming you meant access agreement UI ---> login selector UI)! And we also should figure out a way to display something like this when Login Selector isn't enabled (e.g. when users have just SAML and don't need login selector).

@legrego
Copy link
Member Author

legrego commented Aug 10, 2020

That's a good idea (assuming you meant access agreement UI ---> login selector UI)!

Yup, good catch. I updated the original description 😄

And we also should figure out a way to display something like this when Login Selector isn't enabled (e.g. when users have just SAML and don't need login selector).

Yes that's a great call!

@legrego legrego added the enhancement New value added to drive a business result label Sep 17, 2020
@exalate-issue-sync exalate-issue-sync bot added impact:low Addressing this issue will have a low level of impact on the quality/strength of our product. loe:small Small Level of Effort labels Aug 5, 2021
@legrego legrego removed EnableJiraSync loe:small Small Level of Effort impact:low Addressing this issue will have a low level of impact on the quality/strength of our product. labels Aug 18, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New value added to drive a business result Feature:License Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

3 participants