Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security] Support invalidate API keys by multiple IDs #79714

Closed
jen-huang opened this issue Oct 6, 2020 · 2 comments
Closed

[Security] Support invalidate API keys by multiple IDs #79714

jen-huang opened this issue Oct 6, 2020 · 2 comments
Labels
enhancement New value added to drive a business result Feature:Security/Authentication Platform Security - Authentication Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@jen-huang
Copy link
Contributor

Describe the feature:
Elasticsearch now supports invalidating API keys by multiple IDs, using a new ids field: elastic/elasticsearch#63224

We should support this in the authentication interface, where methods to invalidate by single key ID already exists.

Describe a specific use case for the feature:
This is useful for Fleet where sometimes we need to invalidate up to 20,000 keys from a single user action. Currently we do this by batching single invalidate requests. Once this is available, we can just send one request.

@jen-huang jen-huang added Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! enhancement New value added to drive a business result Feature:Security/Authentication Platform Security - Authentication labels Oct 6, 2020
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@jen-huang
Copy link
Contributor Author

Closed by #87401.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New value added to drive a business result Feature:Security/Authentication Platform Security - Authentication Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

2 participants