From 8f2cb58b700a369f48b728dccafe652a187dc319 Mon Sep 17 00:00:00 2001 From: Tim Sullivan Date: Mon, 3 May 2021 10:44:04 -0700 Subject: [PATCH] Reporting/Docs: update version of reporting_user deprecation (#98988) (#99085) --- docs/settings/reporting-settings.asciidoc | 4 ++-- docs/user/reporting/index.asciidoc | 2 +- docs/user/security/reporting.asciidoc | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/settings/reporting-settings.asciidoc b/docs/settings/reporting-settings.asciidoc index 084ac633e9bc..70f3e272fa5a 100644 --- a/docs/settings/reporting-settings.asciidoc +++ b/docs/settings/reporting-settings.asciidoc @@ -276,14 +276,14 @@ For information about {kib} memory limits, see <>. It is recommended that *Reporting* is configured to use {kib} privileges by setting <> to `false`. By using {kib} privileges, you can define custom roles that grant *Reporting* privileges as sub-features of {kib} applications in *Role Management*. diff --git a/docs/user/security/reporting.asciidoc b/docs/user/security/reporting.asciidoc index 2f331e252c49..ab25dddd0469 100644 --- a/docs/user/security/reporting.asciidoc +++ b/docs/user/security/reporting.asciidoc @@ -17,7 +17,7 @@ For more information, see [[reporting-app-users]] Access to reporting features is limited to privileged users. In older versions of Kibana, you could only grant -users the privilege by assigning them the `reporting_user` role in Elasticsearch. In 7.13 and above, you have +users the privilege by assigning them the `reporting_user` role in Elasticsearch. In 7.14 and above, you have the option to create your own roles that grant access to reporting features using <>. It is recommended that you set `xpack.reporting.roles.enabled: false` in your kibana.yml to begin using Kibana