[Timeline][Search Strategy] - Authorization architecture around search strategy #106782
Labels
discuss
Feature:Detection Alerts/Rules RBAC
Security Solution RBAC for rules and alerts
impact:low
Addressing this issue will have a low level of impact on the quality/strength of our product.
Team:Detection Alerts
Security Detection Alerts Area Team
Team:Detections and Resp
Security Detection Response Team
Team:Threat Hunting
Security Solution Threat Hunting Team
An awesome feature of search strategy is that it allows a user to continue interacting with the applciation while long running queries are conducted in the background. Part of that feature includes giving the user the ability to cancel their long running queries as well.
We figured out while implementing RBAC for alerts within our search strategy that in order for RBAC to work, we needed 1) the full Kibana request passed down to us in the dependencies and 2) the ability to query using internal Kibana user since with RBAC users are not assigned ES privileges. Both of these requirements were met and so RBAC is being added to the timeline search strategy.
However, @lukasolson brought to our attention that the authorization should also occur on cancel.
#105333 (comment)
This ticket is meant to discuss and hopefully make a decision on the following:
asCurrentUser
so authorization is baked into the calls via ES privilegesThe text was updated successfully, but these errors were encountered: