Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

More granular user editing privileges #29932

Open
elasticmachine opened this issue Apr 26, 2017 · 1 comment
Open

More granular user editing privileges #29932

elasticmachine opened this issue Apr 26, 2017 · 1 comment
Labels
>feature :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team

Comments

@elasticmachine
Copy link
Collaborator

Original comment by @joshbressers:

From the forum
https://discuss.elastic.co/t/security-discussion/83714

Meta security

Some of our users should be able to manage a sub-set of other users. It would be good to have this enforced at an Elastic+Security level. Kind of like document level security, but for users.

I notice that if Security had been implemented, for example, by a special index and data format, these features would all be inherently offered by existing ES functionality as well as making it easier for you without necessarily having to provide a separate API. This approach has been valuable in e.g. the implementation of Watcher.

This could make sense for the user API.

@elasticmachine
Copy link
Collaborator Author

Original comment by @skearns64:

I'm a fan of this in the long term. I wonder if we could get some mileage in the nearer term with a simpler change:

We could add a restriction such that a user (UserA) with the manage users and manage/assign roles privileges could not create roles that have more privileges than UserA has, and not only assign roles to users unless UserA has those roles. Basically, prevent anyone from granting themselves or anyone else more privileges than they have today. This means that the superuser would still have full power.

This approach would work in a multi-tenant scenario, where the cluster admin could provision a tenant-admin to manage access to their indexes, etc.

@elasticmachine elasticmachine added the :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC label Apr 25, 2018
@rjernst rjernst added the Team:Security Meta label for security team label May 4, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
>feature :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team
Projects
None yet
Development

No branches or pull requests

3 participants