-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
User Account - List privileges #39318
Comments
Pinging @elastic/kibana-security |
I need to resurrect this PR, but #37127 has some functionality that could be useful for this feature too. Namely the ability to call the If I don't get around to #37127 soon, then we can always cherry-pick those changes out, so that this isn't blocked on that PR. |
Where do we want to surface this info? |
Adding a big +1 for this. APM app has APIs that are being called from external (non-Kibana) services. Currently Kibana responds with 404 if the user is unauthorised to see the resource (even if the user is authenticated). |
Currently, if a user doesn't have the
manage_security
cluster privileges, it's hard to determine what level of access they have. This includes their cluster and index privileges in Elasticsearch, in addition to their Kibana privileges. It's difficult for a user to determine which spaces they have access to and which features they have access to in which spaces.The text was updated successfully, but these errors were encountered: