-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Fleet] API Key application privilege #51688
Comments
Conceptually, using application privileges for this makes sense. However, there are some practical limitations... A user with the It also requires that we know which specific role should have the application privileges. I'm not too familiar with the conceptual "Fleet workflows" which the users will be following within Kibana to know whether or not this is a complication or not. |
@kobelb We want to limit the scope / user permissions the API key has that is used in the agent to talk to Fleet. Everything you list above sound beneficial for what we need it for. Question for the following configs:
Are we able to define these privileges in our Fleet app? Meaning we can create new ones? |
The The It's worth noting that the Kibana UI and APIs for managing roles only support the |
Discussed by email, we are going to use Kibana privileges in Fleet, Fleet is mostly using kibana features so using Kibana Privileges simplifies things on our end and we will get OLS out of the box when this is ready. |
Description
Currently fleet use api keys to enroll agent, and for agent checkin.
This API Key do not have any particular roles and to make the link between agent and api key we saved objects with the id of the api key saved on it.
Could we use application privilege and ressources for api keys? What are the pro and cons to do that
Proposal
For checkin
For enrollment
The text was updated successfully, but these errors were encountered: