-
Notifications
You must be signed in to change notification settings - Fork 285
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Role definitions are not respected #82
Comments
Additional tests shows that as soon as we create a role mapping between a backend role (name does not need to exist at all, can use a bogus name) to a role in kibana with write access to the tenant, it basically overrides any other tenant-permission beeing applied to other roles with access to the same tenant. |
My problem is related to kibana and property checks on the users field, as it does not allow me to keep it empty, i have been using wildcard to not match any or all users. Changing this to empy from the API or by using a bogus character fixes my problem. But i would still assume it is a bug that role mapping ignores backend role type if users are '*' |
Thanks @nateynateynate @tekollt! Closing this as most likely it is not an issue anymore. Please feel free to reopen if otherwise. |
I have a tenant named
TEST-TENANT
I then have three roles, one that gives READ to the tenant, another that gives readwrite a third that grants permissions to indexes so we have a single place to manage it for both of the other roles. While have granular access to dashboards and what not.
The roles are then mapped to two backend roles (openID).
Both roles have mapping to the indicies role in elastic, while it is 1:1 for the read and readwrite role.
The problem is that the role seems to not be respected. I have READ/WRITE permission to the tenant, even if i am only assigned to the backend role
TEST-LOGS-READ
If remove the role
TEST-LOGS-READWRITEs
permission to the tenant, while still beeing assigned the access with the other roleTEST-LOGS-READ
- then the permission is respected and i have only READ access to the tenant.I have verified that the user is only part of a single backend role.
We have also tried to remove the indicies role that is mapped to both backend roles.
The text was updated successfully, but these errors were encountered: