-
Notifications
You must be signed in to change notification settings - Fork 25k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security] Permissions via Aliases #95261
Comments
Pinging @elastic/es-docs (Team:Docs) |
Pinging @elastic/es-security (Team:Security) |
@stefnestor I'm not sure that the current documentation is incorrect. Users can actually specify aliases when defining their roles. The fact that the CSV export in Kibana uses PITs, and that PITs also require read access to the underlying concrete index when opened on an alias looks like an implementation detail that can be added to the CSV export docs. What do you think? |
Putting aside the general question as to whether indices permissions should be granted via aliases, that's not what the limitations doc is trying to say. It specifically means that applying a It is the case that sometimes people will assign permissions via an alias because they think that a filter on the alias will be effective at limiting a user's access to individual documents. In that case they are wrong. But if an admin were to create aliases for |
I just created elastic/kibana#170524 to clarify the additional security requirements when using CSV reports with index aliases, I feel it is the best place to mention that since the page already describes security for that feature. |
Problem Description
👋🏼 howdy, team & @tvernum!
I see this doc
which appears to suggest Role
indices
permissions should not be granted via aliases. (I'm not fully sure what filtered aliases mean & that may be a gotcha on my side. If we can, let's ignore that sub-point for a moment.)In v8.6, @tsullivan moved Kibana CSV Reports over to PIT Searches via kibana#144201 which made it reliant on this elasticsearch#75810 PIT Security discussion.
The noticed effect (which I'll cross-link backwards after filing) appears to be any Role
indices
permissions granted only via Aliases, e.g. Searchable Snapshotspartial-MY_INDEX-00001
with aliasMY_INDEX
, do export via CSV. The fix is for users to update their Role permissions fromMY_INDEX
to*MY_INDEX*
or such.What I would like to submit as "bug" after confirming I'm on the right page is this doc which appears to claim aliases are valid use:
I'd think to remove aliases and also leave a link to the earlier doc to avoid them when defining this logic.
Steps to Reproduce
(I have backwards cross-link to private discussion.)
The text was updated successfully, but these errors were encountered: