Skip to content
This repository was archived by the owner on Aug 16, 2022. It is now read-only.

Commit e1757e3

Browse files
authored
Merge pull request #363 from ashwinkumar12345/ad-user-roles
AD user roles
2 parents 5125c18 + 196ec0d commit e1757e3

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

docs/security/access-control/users-roles.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,8 @@ Role | Description
109109
`alerting_ack_alerts` | Grants permissions to view and acknowledge alerts, but not modify destinations or monitors.
110110
`alerting_full_access` | Grants full permissions to all alerting actions.
111111
`alerting_read_access` | Grants permissions to view alerts, destinations, and monitors, but not acknowledge alerts or modify destinations or monitors.
112+
`anomaly_full_access` | Grants full permissions to all anomaly detection actions.
113+
`anomaly_read_access` | Grants permissions to view detectors, but not create, modify, or delete detectors.
112114
`all_access` | Grants full access to the cluster: all cluster-wide operations, write to all indices, write to all tenants.
113115
`kibana_read_only` | A special role that prevents users from making changes to visualizations, dashboards, and other Kibana objects. See `opendistro_security.readonly_mode.roles` in `kibana.yml`. Pair with the `kibana_user` role.
114116
`kibana_user` | Grants permissions to use Kibana: cluster-wide searches, index monitoring, and write to various Kibana indices.

0 commit comments

Comments
 (0)