-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"Actions & Connectors" users are surprised by the fact that users with read-only permissions can test connectors and execute actions #105512
Comments
Pinging @elastic/kibana-alerting-services (Team:Alerting Services) |
This is actually ok, I think, but worth discussing. A reminder of what the semantic are:
This means, for example, a user with But happy to have a debate about it :) @arisonl |
My view is that because read on connectors allows users to create and attach actions, they should be able to test the connector. However, I think that the privilege semantics are not obvious in the case of connectors and actions: the fact that read on connectors equals write and execute actions, is not immediately obvious, and this has come up a couple of times in the past. I think that this is in contrast to the bulk of other apps/cases, where the semantics of read and write are mostly evident. This is perhaps why this is perceived as a bug. Could sub-privileges help here for decoupling or even for the testing functionality? |
How would that address the perception of this as a bug? Are you thinking users with The only thing they could do in such a case is view the configuration of connectors that they can't actually use, so it seems like there isn't much point to them having access to the feature at all. Feels like a product question, but I wonder if we can relabel "read" as something else for specific features (I know this isn't possible today, but something @elastic/kibana-security can add perhaps?). 🤷 Worth a thought, I guess.
Could we address this in the UX somehow? Adding a callout on the Test tab? |
Changing this issue from |
This is something we can consider in the future, but you're right that it isn't possible today. If we maintain our current privilege "hierarchy" in the future, then whatever replacement you come up with for We are aggregating our authorization wish-list in #95513. I'll add a note there to capture this request. |
Kibana version:
7.14.0-BC
Original install method (e.g. download page, yum, from source, etc.):
Cloud
Describe the bug:
A user with only "Read" permissions on "Actions and Connectors" and "Stack Rules" can test connectors. I'm not sure if this is intentional or not. But it seems to be that limited access users should maybe not be able to test connectors. I imagine a scenario where a read-only user is able to send a test through an existing PagerDuty connector either naively (or belligerently) to wake up the on-call person at 3AM. 😅
Steps to reproduce:
Expected behavior:
It seems to me that only users with permission to create and modify connectors should be able to test the connectors.
The text was updated successfully, but these errors were encountered: