-
Notifications
You must be signed in to change notification settings - Fork 25.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Kibana application privileges to elastic/fleet-server service account #78078
Closed
Tracked by
#112648
Labels
>enhancement
:Security/Authorization
Roles, Privileges, DLS/FLS, RBAC/ABAC
Team:Security
Meta label for security team
Comments
Pinging @elastic/es-security (Team:Security) |
5 tasks
Yes I can get this done as long as the decision is agreed upon by relevant teams. Please feel free to put me as the assignee. The change will be its own separate PR from the one for #77294 since they are two separate issues and each has clearly defined scope. |
ywangd
added a commit
to ywangd/elasticsearch
that referenced
this issue
Sep 22, 2021
This PR adds necessary application privilege for Kibana to allow fleet-server service account to initiate the Fleet setup process. Resolves: elastic#78078
This was referenced Sep 22, 2021
ywangd
added a commit
that referenced
this issue
Oct 6, 2021
This PR adds necessary application privilege for Kibana to allow fleet-server service account to initiate the Fleet setup process. Resolves: #78078
ywangd
added a commit
to ywangd/elasticsearch
that referenced
this issue
Oct 6, 2021
This PR adds necessary application privilege for Kibana to allow fleet-server service account to initiate the Fleet setup process. Resolves: elastic#78078
elasticsearchmachine
pushed a commit
that referenced
this issue
Oct 6, 2021
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
>enhancement
:Security/Authorization
Roles, Privileges, DLS/FLS, RBAC/ABAC
Team:Security
Meta label for security team
In order to support dropping the requirement to need superuser credentials to setup Fleet (elastic/kibana#112647), we'd like to leverage the elastic/fleet-server service account to be able to perform this setup. We plan to register an application privilege from Kibana that would allow us to do this, but we'll need to grant the service account access to Kibana's application privileges for this to work.
This should work very similarly to how we enable the `` user to do the same and we plan to also remove this requirement in 8.x once Kibana initiates Fleet setup without an external user:
elasticsearch/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStore.java
Lines 205 to 208 in 51fcb21
In this case, we'll need to grant access to the
reserved_fleet-setup
privilege for thekibana-*
application.Related to #77294
The text was updated successfully, but these errors were encountered: