diff --git a/docs/settings/reporting-settings.asciidoc b/docs/settings/reporting-settings.asciidoc index 084ac633e9bc..70f3e272fa5a 100644 --- a/docs/settings/reporting-settings.asciidoc +++ b/docs/settings/reporting-settings.asciidoc @@ -276,14 +276,14 @@ For information about {kib} memory limits, see <>. It is recommended that *Reporting* is configured to use {kib} privileges by setting <> to `false`. By using {kib} privileges, you can define custom roles that grant *Reporting* privileges as sub-features of {kib} applications in *Role Management*. diff --git a/docs/user/security/reporting.asciidoc b/docs/user/security/reporting.asciidoc index 2f331e252c49..ab25dddd0469 100644 --- a/docs/user/security/reporting.asciidoc +++ b/docs/user/security/reporting.asciidoc @@ -17,7 +17,7 @@ For more information, see [[reporting-app-users]] Access to reporting features is limited to privileged users. In older versions of Kibana, you could only grant -users the privilege by assigning them the `reporting_user` role in Elasticsearch. In 7.13 and above, you have +users the privilege by assigning them the `reporting_user` role in Elasticsearch. In 7.14 and above, you have the option to create your own roles that grant access to reporting features using <>. It is recommended that you set `xpack.reporting.roles.enabled: false` in your kibana.yml to begin using Kibana