Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

all users can delete indexes and modify Advanced settings, not possible to prohibited that #11647

Closed
KatariinaSalmi opened this issue May 8, 2017 · 4 comments
Labels
feedback_needed Team:Core Core services & architecture: plugins, logging, config, saved objects, http, ES client, i18n, etc

Comments

@KatariinaSalmi
Copy link

Elasticsearch version: 5.2.2

Description of the problem including expected versus actual behavior:
All users with basic role 'kibana_user' can go and delete any index patterns even the user won´t be able to see the data from Vizualizer or Discover.
Case there there is more than 1 indexes (Indexes A, B and C) and user has 2 roles, 1 for special index (Index A) and another is 'kibana_user'.
So if the user has only read access for special index (Index A), but because 'kibana_user' is having delete access rights, it means that user is able to delete all indexes (Index A, B and C) even user does not have specified access for those (Index B and C).

Without role 'kibana_user' user is not able to see any of those indexes. So 'Kibana_user' has to give to ALL users, which means that ALL users gets DELETE access rights..

Quite big security risk..

I would say role 'kibana_user' should only have read access right, nothing else.
Then new roles can be created and suitable access rights granted separatelly.

@reube
Copy link

reube commented May 8, 2017

I agree with this, re index patterns at least - it is a significant issue. ELK devs - please could you give some indication of when this might be resolved?
It would help if a user could only see the index patterns for which they have access to the data. Worse still deleting them.

@weltenwort
Copy link
Member

weltenwort commented May 9, 2017

We have to make sure to keep the following concepts straight:

  • The data indices hold the documents that are supposed to be visualized in
    Kibana. They can be protected from unauthorized access on the database level
    using the comprehensive security mechanism that is part of x-pack.
  • The index patterns are a unit of configuration for Kibana, that are stored
    in the Kibana index (.kibana by default). Since they are read and written by
    the Kibana server process, they are currently readable and writable by any
    Kibana user. This is something that is being worked on (see Saved object authorization - Phase 1 #4453).

Deleting an index pattern does not delete the indices matched by the pattern. A
user does not have to have write permissions to an index that contains data to
be visualized.

Is it correct to say that this enhancement request is for the ability to assign
different permissions to users to read and write index pattern definitions and
Kibana settings, similar to what is already possible with the data indices?

@weltenwort weltenwort added Team:Core Core services & architecture: plugins, logging, config, saved objects, http, ES client, i18n, etc feedback_needed labels May 9, 2017
@KatariinaSalmi
Copy link
Author

KatariinaSalmi commented May 9, 2017 via email

@legrego
Copy link
Member

legrego commented Mar 27, 2020

Resolved via #18178 and #18948

@legrego legrego closed this as completed Mar 27, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feedback_needed Team:Core Core services & architecture: plugins, logging, config, saved objects, http, ES client, i18n, etc
Projects
None yet
Development

No branches or pull requests

4 participants