You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Update Fleet docs for new 'read' access roles (#1697) (#1701)
* Update Fleet docs for new 'read' access roles
* fixup
(cherry picked from commit df376c1)
Co-authored-by: David Kilfoyle <41695641+kilfoyle@users.noreply.github.com>
Copy file name to clipboardexpand all lines: docs/en/ingest-management/security/fleet-roles-and-privileges.asciidoc
+31-13
Original file line number
Diff line number
Diff line change
@@ -7,39 +7,57 @@ Assigning the {kib} feature privileges `Fleet` and `Integrations` grants access
7
7
8
8
`all`:: Grants full read-write access.
9
9
`read`:: Grants read-only access.
10
+
`none`:: No access is granted.
10
11
12
+
Take advantage of these privilege settings by:
13
+
14
+
* <<fleet-roles-and-privileges-built-in,Using an {es} built-in role>>
15
+
* <<fleet-roles-and-privileges-create,Creating a new role>>
16
+
17
+
[discrete]
18
+
[[fleet-roles-and-privileges-built-in]]
19
+
== Built-in roles
20
+
21
+
{es} comes with built-in roles that include default privileges.
22
+
23
+
`editor`::
11
24
The built-in `editor` role grants the following privileges, supporting full read-write access to {fleet} and Integrations:
12
25
13
-
* {Fleet}: `All`
14
-
* Integrations: `All`
26
+
* {Fleet}: `all`
27
+
* Integrations: `all`
15
28
29
+
`viewer`::
16
30
The built-in `viewer` role grants the following privileges, supporting read-only access to {fleet} and Integrations:
17
31
18
-
* {Fleet}:: `None`
19
-
* Integrations:: `Read`
32
+
* {Fleet}: `read`
33
+
* Integrations: `read`
20
34
21
-
You can also create a new role that can be assigned to a userto grant access to {fleet} and Integrations.
35
+
You can also create a new role that can be assigned to a user, in order to grant more specific levels of access to {fleet} and Integrations.
22
36
23
37
[discrete]
24
38
[[fleet-roles-and-privileges-create]]
25
39
== Create a role for {fleet}
26
40
27
-
To create a new role with full access to use and manage {fleet} and Integrations:
41
+
To create a new role with access to {fleet} and Integrations:
28
42
29
43
. In {kib}, go to **Management -> Stack Management**.
30
44
. In the **Security** section, select **Roles**.
31
45
. Select **Create role**.
32
46
. Specify a name for the role.
33
47
. Leave the {es} settings at their defaults, or refer to {ref}/security-privileges.html[Security privileges] for descriptions of the available settings.
34
-
. In the {kib} section, select **Add Kibana privilege**.
35
-
. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users needs the {kib} privileges in all spaces.
48
+
. In the {kib} section, select **Assign to space**.
49
+
. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users need the {kib} privileges in all spaces.
36
50
. Expand the **Management** section.
37
-
. Set **Fleet** privileges to **All**.
38
-
. Set **Integrations** privileges to **All**.
51
+
. Choose the access level that you'd like the role to have with respect to {fleet} and integrations:
39
52
53
+
.. To grant the role full access to use and manage {fleet} and integrations, set both the **Fleet** and **Integrations** privileges to `All`.
54
+
+
40
55
[role="screenshot"]
41
-
image::images/kibana-fleet-privileges.png[Kibana privileges flyout showing Fleet and Integrations set to All]
56
+
image::images/kibana-fleet-privileges-all.png[Kibana privileges flyout showing Fleet and Integrations set to All]
42
57
43
-
To create a read-only user for Integrations, follow the same steps as above but set the **Fleet** privileges to **None** and the **Integrations** privileges to **Read**.
58
+
.. Similarly, to create a read-only user for {fleet} and Integrations, set both the **Fleet** and **Integrations** privileges to `Read`.
59
+
+
60
+
[role="screenshot"]
61
+
image::images/kibana-fleet-privileges-read.png[Kibana privileges flyout showing Fleet and Integrations set to All]
44
62
45
-
Read-only access to {fleet} is not currently supported but is planned for development in a later release.
63
+
Once you've created a new role you can assign it to any {es} user. You can edit the role at any time by returning to the **Roles** page in {kib}.
0 commit comments