Non-interactive sessions leveraging the http
auth provider should have their profiles activated
#158277
Labels
enhancement
New value added to drive a business result
Feature:Security/User Profile
NeededFor:Alerting Services
NeededFor:Dashboard
NeededFor:ResponseOps
NeededFor:Security Solution
SIEM, Endpoint, Timeline, Analyzer, Cases
NeededFor:SharedUX
Team:Security
Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
We currently do not activate user profiles for accounts leveraging the
http
auth provider (e.g. passing anAuthorization
header to Kibana via reverse proxy).We should allow these accounts to have their profiles activated, so they can take advantage of profile-related features. We will need to be careful about this implementation, as we do not want to blindly activate user profiles on any API call to Kibana. We will need to be thoughtful about when & where we decide to perform this activation step.
Required by: #167459
The text was updated successfully, but these errors were encountered: