Skip to content

Commit 31a36e9

Browse files
Update Fleet docs for new 'read' access roles (#1697) (#1701)
* Update Fleet docs for new 'read' access roles * fixup (cherry picked from commit df376c1) Co-authored-by: David Kilfoyle <41695641+kilfoyle@users.noreply.github.com>
1 parent 22e5165 commit 31a36e9

File tree

3 files changed

+31
-13
lines changed

3 files changed

+31
-13
lines changed
Loading
Loading

docs/en/ingest-management/security/fleet-roles-and-privileges.asciidoc

+31-13
Original file line numberDiff line numberDiff line change
@@ -7,39 +7,57 @@ Assigning the {kib} feature privileges `Fleet` and `Integrations` grants access
77

88
`all`:: Grants full read-write access.
99
`read`:: Grants read-only access.
10+
`none`:: No access is granted.
1011

12+
Take advantage of these privilege settings by:
13+
14+
* <<fleet-roles-and-privileges-built-in,Using an {es} built-in role>>
15+
* <<fleet-roles-and-privileges-create,Creating a new role>>
16+
17+
[discrete]
18+
[[fleet-roles-and-privileges-built-in]]
19+
== Built-in roles
20+
21+
{es} comes with built-in roles that include default privileges.
22+
23+
`editor`::
1124
The built-in `editor` role grants the following privileges, supporting full read-write access to {fleet} and Integrations:
1225

13-
* {Fleet}: `All`
14-
* Integrations: `All`
26+
* {Fleet}: `all`
27+
* Integrations: `all`
1528

29+
`viewer`::
1630
The built-in `viewer` role grants the following privileges, supporting read-only access to {fleet} and Integrations:
1731

18-
* {Fleet}:: `None`
19-
* Integrations:: `Read`
32+
* {Fleet}: `read`
33+
* Integrations: `read`
2034

21-
You can also create a new role that can be assigned to a user to grant access to {fleet} and Integrations.
35+
You can also create a new role that can be assigned to a user, in order to grant more specific levels of access to {fleet} and Integrations.
2236

2337
[discrete]
2438
[[fleet-roles-and-privileges-create]]
2539
== Create a role for {fleet}
2640

27-
To create a new role with full access to use and manage {fleet} and Integrations:
41+
To create a new role with access to {fleet} and Integrations:
2842

2943
. In {kib}, go to **Management -> Stack Management**.
3044
. In the **Security** section, select **Roles**.
3145
. Select **Create role**.
3246
. Specify a name for the role.
3347
. Leave the {es} settings at their defaults, or refer to {ref}/security-privileges.html[Security privileges] for descriptions of the available settings.
34-
. In the {kib} section, select **Add Kibana privilege**.
35-
. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users needs the {kib} privileges in all spaces.
48+
. In the {kib} section, select **Assign to space**.
49+
. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users need the {kib} privileges in all spaces.
3650
. Expand the **Management** section.
37-
. Set **Fleet** privileges to **All**.
38-
. Set **Integrations** privileges to **All**.
51+
. Choose the access level that you'd like the role to have with respect to {fleet} and integrations:
3952

53+
.. To grant the role full access to use and manage {fleet} and integrations, set both the **Fleet** and **Integrations** privileges to `All`.
54+
+
4055
[role="screenshot"]
41-
image::images/kibana-fleet-privileges.png[Kibana privileges flyout showing Fleet and Integrations set to All]
56+
image::images/kibana-fleet-privileges-all.png[Kibana privileges flyout showing Fleet and Integrations set to All]
4257

43-
To create a read-only user for Integrations, follow the same steps as above but set the **Fleet** privileges to **None** and the **Integrations** privileges to **Read**.
58+
.. Similarly, to create a read-only user for {fleet} and Integrations, set both the **Fleet** and **Integrations** privileges to `Read`.
59+
+
60+
[role="screenshot"]
61+
image::images/kibana-fleet-privileges-read.png[Kibana privileges flyout showing Fleet and Integrations set to All]
4462

45-
Read-only access to {fleet} is not currently supported but is planned for development in a later release.
63+
Once you've created a new role you can assign it to any {es} user. You can edit the role at any time by returning to the **Roles** page in {kib}.

0 commit comments

Comments
 (0)