Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

manage_index_templates is not granular enough #53110

Open
bh9 opened this issue Mar 4, 2020 · 4 comments
Open

manage_index_templates is not granular enough #53110

bh9 opened this issue Mar 4, 2020 · 4 comments
Labels
>enhancement :Security/Security Security issues without another label Team:Security Meta label for security team

Comments

@bh9
Copy link

bh9 commented Mar 4, 2020

manage_index_templates is the only setting which controls permissions on templates. This means that to allow a user to create a template, you also have to let them delete or modify any other template. In practice, this means that running a multi-user setting where users are using whatever beats products they want involves either trusting all users with manage_index_templates, or superusers creating a lot of templates for them. #53101 offers a few potential approaches to make this more approachable, e.g. by giving roles a maximum priority, so that they can't modify centrally managed templates

@cbuescher cbuescher added the :Security/Security Security issues without another label label Mar 9, 2020
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security (:Security/Security)

@tdmalone
Copy link

We'd like to see the ability to just read index templates, rather than have to provide write access as well.

@albertzaharovits
Copy link
Contributor

Related to #29732

@FrankHassanabad
Copy link
Contributor

Any updates on this?

We are up against some thorny issues on Security Solutions where we are trying to roll over our alerting/signals index and we would like the existing user to be able to just read the index templates rather than have manage_index_templates

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
>enhancement :Security/Security Security issues without another label Team:Security Meta label for security team
Projects
None yet
Development

No branches or pull requests

8 participants