This commit is contained in:
parent
b8863f2061
commit
8f2cb58b70
|
@ -276,14 +276,14 @@ For information about {kib} memory limits, see <<production, using {kib} in a pr
|
|||
setting. Defaults to `.reporting`.
|
||||
|
||||
| [[xpack-reporting-roles-enabled]] `xpack.reporting.roles.enabled`
|
||||
| deprecated:[7.13.0,This setting must be set to `false` in 8.0.] When `true`, grants users
|
||||
| deprecated:[7.14.0,This setting must be set to `false` in 8.0.] When `true`, grants users
|
||||
access to the {report-features} by assigning reporting roles, specified by `xpack.reporting.roles.allow`.
|
||||
Granting access to users this way is deprecated. Set to `false` and use
|
||||
{kibana-ref}/kibana-privileges.html[{kib} privileges] instead.
|
||||
Defaults to `true`.
|
||||
|
||||
| `xpack.reporting.roles.allow`
|
||||
| deprecated:[7.13.0,This setting will be removed in 8.0.] Specifies the roles,
|
||||
| deprecated:[7.14.0,This setting will be removed in 8.0.] Specifies the roles,
|
||||
in addition to superusers, that can generate reports, using the {ref}/security-api.html#security-role-apis[{es} role management APIs].
|
||||
Requires `xpack.reporting.roles.enabled` to be `true`.
|
||||
Granting access to users this way is deprecated. Use
|
||||
|
|
|
@ -32,7 +32,7 @@ for different operating systems.
|
|||
== Roles and privileges
|
||||
|
||||
When security is enabled, access to the {report-features} is controlled by security privileges. In versions 7.12 and earlier, you can grant access to the {report-features}
|
||||
by assigning users the `reporting_user` role in {es}. In 7.13 and later, you can configure *Reporting* to use
|
||||
by assigning users the `reporting_user` role in {es}. In 7.14 and later, you can configure *Reporting* to use
|
||||
<<kibana-privileges, {kib} privileges>>. It is recommended that *Reporting* is configured to
|
||||
use {kib} privileges by setting <<xpack-reporting-roles-enabled,`xpack.reporting.roles.enabled`>> to `false`. By using {kib} privileges, you can define
|
||||
custom roles that grant *Reporting* privileges as sub-features of {kib} applications in *Role Management*.
|
||||
|
|
|
@ -17,7 +17,7 @@ For more information, see
|
|||
|
||||
[[reporting-app-users]]
|
||||
Access to reporting features is limited to privileged users. In older versions of Kibana, you could only grant
|
||||
users the privilege by assigning them the `reporting_user` role in Elasticsearch. In 7.13 and above, you have
|
||||
users the privilege by assigning them the `reporting_user` role in Elasticsearch. In 7.14 and above, you have
|
||||
the option to create your own roles that grant access to reporting features using <<kibana-privileges, {kib} privileges>>.
|
||||
|
||||
It is recommended that you set `xpack.reporting.roles.enabled: false` in your kibana.yml to begin using Kibana
|
||||
|
|
Loading…
Reference in a new issue