Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

User Account - List privileges #39318

Open
kobelb opened this issue Jun 19, 2019 · 5 comments
Open

User Account - List privileges #39318

kobelb opened this issue Jun 19, 2019 · 5 comments
Labels
enhancement New value added to drive a business result Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@kobelb
Copy link
Contributor

kobelb commented Jun 19, 2019

Currently, if a user doesn't have the manage_security cluster privileges, it's hard to determine what level of access they have. This includes their cluster and index privileges in Elasticsearch, in addition to their Kibana privileges. It's difficult for a user to determine which spaces they have access to and which features they have access to in which spaces.

@kobelb kobelb added the Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! label Jun 19, 2019
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security

@kobelb kobelb added the enhancement New value added to drive a business result label Jun 19, 2019
@kobelb kobelb changed the title User account - list privileges User account - List privileges Jun 19, 2019
@kobelb kobelb changed the title User account - List privileges User Account - List privileges Jun 19, 2019
@legrego
Copy link
Member

legrego commented Jul 2, 2019

I need to resurrect this PR, but #37127 has some functionality that could be useful for this feature too. Namely the ability to call the _security/user/_privileges endpoint, and transform it into a well-formed response that Kibana can work with. This extracts/reuses the logic from the GET /api/security/roles API which transforms ES applications into role privilege definitions.

If I don't get around to #37127 soon, then we can always cherry-pick those changes out, so that this isn't blocked on that PR.

@arisonl
Copy link
Contributor

arisonl commented Sep 25, 2019

Where do we want to surface this info?

@kobelb
Copy link
Contributor Author

kobelb commented Sep 25, 2019

The original plan was to make this part of the "User Account" screen, shown below:

Screen Shot 2019-09-25 at 10 54 39 AM

@legrego legrego removed their assignment Mar 12, 2020
@sorenlouv
Copy link
Member

Adding a big +1 for this. APM app has APIs that are being called from external (non-Kibana) services. Currently Kibana responds with 404 if the user is unauthorised to see the resource (even if the user is authenticated).
If the endpoint itself cannot provide insights into whether the user may access it, there should be an API where the service can make a preliminary request to inquire whether their privileges are sufficient.

@exalate-issue-sync exalate-issue-sync bot added impact:low Addressing this issue will have a low level of impact on the quality/strength of our product. loe:small Small Level of Effort labels Aug 5, 2021
@legrego legrego removed EnableJiraSync loe:small Small Level of Effort impact:low Addressing this issue will have a low level of impact on the quality/strength of our product. labels Aug 18, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New value added to drive a business result Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

5 participants