Skip to content

Commit 29b915a

Browse files
mergify[bot]joepeeplesgithub-actions[bot]
authored
[8.16] [BUG] All Kibana privileges don't grant Security / Elastic Defend features by default (backport #6134) (#6137)
* [BUG] All Kibana privileges don't grant Security / Elastic Defend features by default (#6134) * Align with ESS on nav steps * Add admonition for emphasis (cherry picked from commit 122bea2) # Conflicts: # docs/serverless/edr-install-config/defend-feature-privs.asciidoc * Delete docs/serverless directory and its contents --------- Co-authored-by: Joe Peeples <[email protected]> Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
1 parent c36b604 commit 29b915a

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

docs/getting-started/defend-feature-privs.asciidoc

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,11 @@ To configure roles and privileges, find **Roles** in the navigation menu or by u
1212

1313
NOTE: {elastic-defend}'s feature privileges must be assigned to *All Spaces*. You can't assign them to an individual space.
1414

15-
To grant access, select *All* for the *Security* feature in the *{kib} privileges* configuration UI, then turn on the *Customize sub-feature privileges* switch. For each of the following sub-feature privileges, select the type of access you want to allow:
15+
To grant access, select *All* for the *Security* feature in the *Assign role to space* configuration UI, then turn on the *Customize sub-feature privileges* switch.
16+
17+
IMPORTANT: Selecting **All** for the overall **Security** feature does NOT enable any sub-features. You must also enable the **Customize sub-feature privileges** switch, and then enable each sub-feature privilege individually.
18+
19+
For each of the following sub-feature privileges, select the type of access you want to allow:
1620

1721
* *All*: Users have full access to the feature, which includes performing all available actions and managing configuration.
1822
* *Read*: Users can view the feature, but can't perform any actions or manage configuration (some features don't have this privilege).

0 commit comments

Comments
 (0)