Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security - allow for custom cluster privileges #43817

Merged
merged 7 commits into from
Aug 27, 2019

Conversation

legrego
Copy link
Member

@legrego legrego commented Aug 22, 2019

Summary

Allows the cluster privileges dropdown to accept custom options, so users can specify undocumented cluster privileges.

This update makes the UI consistent with both the Kibana and ES role APIs.

custom_cluster_privs

Resolves #42975

"Release note: Role management screen now allows for custom cluster privileges to be entered, consistent with the role APIs."

@legrego legrego added Feature:Users/Roles/API Keys release_note:enhancement Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! labels Aug 22, 2019
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security

@elasticmachine
Copy link
Contributor

💚 Build Succeeded

@legrego legrego marked this pull request as ready for review August 22, 2019 22:13
@legrego legrego requested a review from a team as a code owner August 22, 2019 22:13
@elasticmachine
Copy link
Contributor

💔 Build Failed

@elasticmachine
Copy link
Contributor

💚 Build Succeeded

@elasticmachine
Copy link
Contributor

💚 Build Succeeded

@elasticmachine
Copy link
Contributor

💚 Build Succeeded

@legrego legrego merged commit 1d0c1c2 into elastic:master Aug 27, 2019
@legrego legrego deleted the security/custom-cluster-privs branch August 27, 2019 10:04
legrego added a commit to legrego/kibana that referenced this pull request Aug 27, 2019
* allow for custom cluster privileges

* improve prop/state names

* update snapshot

* remove unnecessary code

* removing state altogether
legrego added a commit that referenced this pull request Aug 27, 2019
* allow for custom cluster privileges

* improve prop/state names

* update snapshot

* remove unnecessary code

* removing state altogether
simianhacker pushed a commit to simianhacker/kibana that referenced this pull request Aug 27, 2019
* allow for custom cluster privileges

* improve prop/state names

* update snapshot

* remove unnecessary code

* removing state altogether
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Feature:Users/Roles/API Keys release_note:enhancement Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! v7.4.0 v8.0.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Security] User Role Management does not allow custom privileges
3 participants