Skip to content

Commit 7359196

Browse files
authored
Revert "Update Fleet docs for new 'read' access roles (#1697) (#1702)"
This reverts commit dccc4ea.
1 parent de7aeb0 commit 7359196

File tree

3 files changed

+13
-31
lines changed

3 files changed

+13
-31
lines changed
Binary file not shown.
Binary file not shown.

docs/en/ingest-management/security/fleet-roles-and-privileges.asciidoc

+13-31
Original file line numberDiff line numberDiff line change
@@ -7,57 +7,39 @@ Assigning the {kib} feature privileges `Fleet` and `Integrations` grants access
77

88
`all`:: Grants full read-write access.
99
`read`:: Grants read-only access.
10-
`none`:: No access is granted.
1110

12-
Take advantage of these privilege settings by:
13-
14-
* <<fleet-roles-and-privileges-built-in,Using an {es} built-in role>>
15-
* <<fleet-roles-and-privileges-create,Creating a new role>>
16-
17-
[discrete]
18-
[[fleet-roles-and-privileges-built-in]]
19-
== Built-in roles
20-
21-
{es} comes with built-in roles that include default privileges.
22-
23-
`editor`::
2411
The built-in `editor` role grants the following privileges, supporting full read-write access to {fleet} and Integrations:
2512

26-
* {Fleet}: `all`
27-
* Integrations: `all`
13+
* {Fleet}: `All`
14+
* Integrations: `All`
2815

29-
`viewer`::
3016
The built-in `viewer` role grants the following privileges, supporting read-only access to {fleet} and Integrations:
3117

32-
* {Fleet}: `read`
33-
* Integrations: `read`
18+
* {Fleet}:: `None`
19+
* Integrations:: `Read`
3420

35-
You can also create a new role that can be assigned to a user, in order to grant more specific levels of access to {fleet} and Integrations.
21+
You can also create a new role that can be assigned to a user to grant access to {fleet} and Integrations.
3622

3723
[discrete]
3824
[[fleet-roles-and-privileges-create]]
3925
== Create a role for {fleet}
4026

41-
To create a new role with access to {fleet} and Integrations:
27+
To create a new role with full access to use and manage {fleet} and Integrations:
4228

4329
. In {kib}, go to **Management -> Stack Management**.
4430
. In the **Security** section, select **Roles**.
4531
. Select **Create role**.
4632
. Specify a name for the role.
4733
. Leave the {es} settings at their defaults, or refer to {ref}/security-privileges.html[Security privileges] for descriptions of the available settings.
48-
. In the {kib} section, select **Assign to space**.
49-
. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users need the {kib} privileges in all spaces.
34+
. In the {kib} section, select **Add Kibana privilege**.
35+
. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users needs the {kib} privileges in all spaces.
5036
. Expand the **Management** section.
51-
. Choose the access level that you'd like the role to have with respect to {fleet} and integrations:
37+
. Set **Fleet** privileges to **All**.
38+
. Set **Integrations** privileges to **All**.
5239

53-
.. To grant the role full access to use and manage {fleet} and integrations, set both the **Fleet** and **Integrations** privileges to `All`.
54-
+
5540
[role="screenshot"]
56-
image::images/kibana-fleet-privileges-all.png[Kibana privileges flyout showing Fleet and Integrations set to All]
41+
image::images/kibana-fleet-privileges.png[Kibana privileges flyout showing Fleet and Integrations set to All]
5742

58-
.. Similarly, to create a read-only user for {fleet} and Integrations, set both the **Fleet** and **Integrations** privileges to `Read`.
59-
+
60-
[role="screenshot"]
61-
image::images/kibana-fleet-privileges-read.png[Kibana privileges flyout showing Fleet and Integrations set to All]
43+
To create a read-only user for Integrations, follow the same steps as above but set the **Fleet** privileges to **None** and the **Integrations** privileges to **Read**.
6244

63-
Once you've created a new role you can assign it to any {es} user. You can edit the role at any time by returning to the **Roles** page in {kib}.
45+
Read-only access to {fleet} is not currently supported but is planned for development in a later release.

0 commit comments

Comments
 (0)