Skip to content

Commit 62e88e3

Browse files
committed
Add read-only access docs for Fleet
1 parent 755561b commit 62e88e3

File tree

4 files changed

+35
-19
lines changed

4 files changed

+35
-19
lines changed

reference/ingestion-tools/fleet/fleet-roles-privileges.md

Lines changed: 35 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -15,39 +15,55 @@ Assigning the {{kib}} feature privileges `Fleet` and `Integrations` grants acces
1515
`read`
1616
: Grants read-only access.
1717

18-
The built-in `editor` role grants the following privileges, supporting full read-write access to {{fleet}} and Integrations:
18+
`none`
19+
: No access is granted.
1920

20-
* {{Fleet}}: `All`
21-
* Integrations: `All`
21+
Take advantage of these privilege settings by:
2222

23+
* [Using an {{es}} built-in role](#fleet-roles-and-privileges-built-in)
24+
* [Creating a new role](#fleet-roles-and-privileges-create)
25+
26+
## Built-in roles [fleet-roles-and-privileges-built-in]
27+
28+
{{es}} comes with built-in roles that include default privileges.
29+
30+
`editor`
31+
: The built-in `editor` role grants the following privileges, supporting full read-write access to {{fleet}} and Integrations:
32+
* {{Fleet}}: `all`
33+
* Integrations: `all`
34+
35+
`viewer`
2336
The built-in `viewer` role grants the following privileges, supporting read-only access to {{fleet}} and Integrations:
2437

25-
* {{Fleet}}:: `None`
26-
* Integrations:: `Read`
38+
* {{Fleet}}:: `read`
39+
* Integrations:: `read`
2740

28-
You can also create a new role that can be assigned to a user to grant access to {{fleet}} and Integrations.
41+
You can also create a new role that can be assigned to a user, in order to grant more specific levels of access to {{fleet}} and Integrations.
2942

3043

3144
## Create a role for {{fleet}} [fleet-roles-and-privileges-create]
3245

33-
To create a new role with full access to use and manage {{fleet}} and Integrations:
46+
To create a new role with access to {{fleet}} and Integrations:
3447

3548
1. In {{kib}}, go to **Management → Stack Management**.
3649
2. In the **Security** section, select **Roles**.
3750
3. Select **Create role**.
3851
4. Specify a name for the role.
3952
5. Leave the {{es}} settings at their defaults, or refer to [Security privileges](asciidocalypse://docs/reference/elasticsearch/security-privileges.md) for descriptions of the available settings.
40-
6. In the {{kib}} section, select **Add Kibana privilege**.
41-
7. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users needs the {{kib}} privileges in all spaces.
53+
6. In the {{kib}} section, select **Assign to space**.
54+
7. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users need the {{kib}} privileges in all spaces.
4255
8. Expand the **Management** section.
4356
9. Set **Fleet** privileges to **All**.
44-
10. Set **Integrations** privileges to **All**.
45-
46-
:::{image} images/kibana-fleet-privileges.png
47-
:alt: Kibana privileges flyout showing Fleet and Integrations set to All
48-
:class: screenshot
49-
:::
50-
51-
To create a read-only user for Integrations, follow the same steps as above but set the **Fleet** privileges to **None*** and the ***Integrations** privileges to **Read**.
52-
53-
Read-only access to {{fleet}} is not currently supported but is planned for development in a later release.
57+
10. Choose the access level that you'd like the role to have with respect to {{fleet}} and integrations:
58+
1. To grant the role full access to use and manage {{fleet}} and integrations, set both the **Fleet** and **Integrations** privileges to `All`.
59+
:::{image} images/kibana-fleet-privileges-all.png
60+
:alt: Kibana privileges flyout showing Fleet and Integrations access set to All
61+
:class: screenshot
62+
:::
63+
2. Similarly, to create a read-only user for {{fleet}} and Integrations, set both the **Fleet** and **Integrations** privileges to `Read`.
64+
:::{image} images/kibana-fleet-privileges-read.png
65+
:alt: Kibana privileges flyout showing Fleet and Integrations access set to All
66+
:class: screenshot
67+
:::
68+
69+
Once you've created a new role you can assign it to any {{es}} user. You can edit the role at any time by returning to the **Roles** page in {{kib}}.
192 KB
Loading
192 KB
Loading
-85.5 KB
Binary file not shown.

0 commit comments

Comments
 (0)