You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{es}} comes with built-in roles that include default privileges.
29
+
30
+
`editor`
31
+
: The built-in `editor` role grants the following privileges, supporting full read-write access to {{fleet}} and Integrations:
32
+
* {{Fleet}}: `all`
33
+
* Integrations: `all`
34
+
35
+
`viewer`
23
36
The built-in `viewer` role grants the following privileges, supporting read-only access to {{fleet}} and Integrations:
24
37
25
-
* {{Fleet}}:: `None`
26
-
* Integrations:: `Read`
38
+
* {{Fleet}}:: `read`
39
+
* Integrations:: `read`
27
40
28
-
You can also create a new role that can be assigned to a userto grant access to {{fleet}} and Integrations.
41
+
You can also create a new role that can be assigned to a user, in order to grant more specific levels of access to {{fleet}} and Integrations.
29
42
30
43
31
44
## Create a role for {{fleet}} [fleet-roles-and-privileges-create]
32
45
33
-
To create a new role with full access to use and manage {{fleet}} and Integrations:
46
+
To create a new role with access to {{fleet}} and Integrations:
34
47
35
48
1. In {{kib}}, go to **Management → Stack Management**.
36
49
2. In the **Security** section, select **Roles**.
37
50
3. Select **Create role**.
38
51
4. Specify a name for the role.
39
52
5. Leave the {{es}} settings at their defaults, or refer to [Security privileges](asciidocalypse://docs/reference/elasticsearch/security-privileges.md) for descriptions of the available settings.
40
-
6. In the {{kib}} section, select **Add Kibana privilege**.
41
-
7. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users needs the {{kib}} privileges in all spaces.
53
+
6. In the {{kib}} section, select **Assign to space**.
54
+
7. In the **Spaces** menu, select *** All Spaces**. Since many Integrations assets are shared across spaces, the users need the {{kib}} privileges in all spaces.
42
55
8. Expand the **Management** section.
43
56
9. Set **Fleet** privileges to **All**.
44
-
10. Set **Integrations** privileges to **All**.
45
-
46
-
:::{image} images/kibana-fleet-privileges.png
47
-
:alt: Kibana privileges flyout showing Fleet and Integrations set to All
48
-
:class: screenshot
49
-
:::
50
-
51
-
To create a read-only user for Integrations, follow the same steps as above but set the **Fleet** privileges to **None*** and the ***Integrations** privileges to **Read**.
52
-
53
-
Read-only access to {{fleet}} is not currently supported but is planned for development in a later release.
57
+
10. Choose the access level that you'd like the role to have with respect to {{fleet}} and integrations:
58
+
1. To grant the role full access to use and manage {{fleet}} and integrations, set both the **Fleet** and **Integrations** privileges to `All`.
59
+
:::{image} images/kibana-fleet-privileges-all.png
60
+
:alt: Kibana privileges flyout showing Fleet and Integrations access set to All
61
+
:class: screenshot
62
+
:::
63
+
2. Similarly, to create a read-only user for {{fleet}} and Integrations, set both the **Fleet** and **Integrations** privileges to `Read`.
0 commit comments