Reporting/Docs: update version of reporting_user deprecation (#98988) (#99085)

This commit is contained in:
Tim Sullivan 2021-05-03 10:44:04 -07:00 committed by GitHub
parent b8863f2061
commit 8f2cb58b70
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
3 changed files with 4 additions and 4 deletions

View file

@ -276,14 +276,14 @@ For information about {kib} memory limits, see <<production, using {kib} in a pr
setting. Defaults to `.reporting`. setting. Defaults to `.reporting`.
| [[xpack-reporting-roles-enabled]] `xpack.reporting.roles.enabled` | [[xpack-reporting-roles-enabled]] `xpack.reporting.roles.enabled`
| deprecated:[7.13.0,This setting must be set to `false` in 8.0.] When `true`, grants users | deprecated:[7.14.0,This setting must be set to `false` in 8.0.] When `true`, grants users
access to the {report-features} by assigning reporting roles, specified by `xpack.reporting.roles.allow`. access to the {report-features} by assigning reporting roles, specified by `xpack.reporting.roles.allow`.
Granting access to users this way is deprecated. Set to `false` and use Granting access to users this way is deprecated. Set to `false` and use
{kibana-ref}/kibana-privileges.html[{kib} privileges] instead. {kibana-ref}/kibana-privileges.html[{kib} privileges] instead.
Defaults to `true`. Defaults to `true`.
| `xpack.reporting.roles.allow` | `xpack.reporting.roles.allow`
| deprecated:[7.13.0,This setting will be removed in 8.0.] Specifies the roles, | deprecated:[7.14.0,This setting will be removed in 8.0.] Specifies the roles,
in addition to superusers, that can generate reports, using the {ref}/security-api.html#security-role-apis[{es} role management APIs]. in addition to superusers, that can generate reports, using the {ref}/security-api.html#security-role-apis[{es} role management APIs].
Requires `xpack.reporting.roles.enabled` to be `true`. Requires `xpack.reporting.roles.enabled` to be `true`.
Granting access to users this way is deprecated. Use Granting access to users this way is deprecated. Use

View file

@ -32,7 +32,7 @@ for different operating systems.
== Roles and privileges == Roles and privileges
When security is enabled, access to the {report-features} is controlled by security privileges. In versions 7.12 and earlier, you can grant access to the {report-features} When security is enabled, access to the {report-features} is controlled by security privileges. In versions 7.12 and earlier, you can grant access to the {report-features}
by assigning users the `reporting_user` role in {es}. In 7.13 and later, you can configure *Reporting* to use by assigning users the `reporting_user` role in {es}. In 7.14 and later, you can configure *Reporting* to use
<<kibana-privileges, {kib} privileges>>. It is recommended that *Reporting* is configured to <<kibana-privileges, {kib} privileges>>. It is recommended that *Reporting* is configured to
use {kib} privileges by setting <<xpack-reporting-roles-enabled,`xpack.reporting.roles.enabled`>> to `false`. By using {kib} privileges, you can define use {kib} privileges by setting <<xpack-reporting-roles-enabled,`xpack.reporting.roles.enabled`>> to `false`. By using {kib} privileges, you can define
custom roles that grant *Reporting* privileges as sub-features of {kib} applications in *Role Management*. custom roles that grant *Reporting* privileges as sub-features of {kib} applications in *Role Management*.

View file

@ -17,7 +17,7 @@ For more information, see
[[reporting-app-users]] [[reporting-app-users]]
Access to reporting features is limited to privileged users. In older versions of Kibana, you could only grant Access to reporting features is limited to privileged users. In older versions of Kibana, you could only grant
users the privilege by assigning them the `reporting_user` role in Elasticsearch. In 7.13 and above, you have users the privilege by assigning them the `reporting_user` role in Elasticsearch. In 7.14 and above, you have
the option to create your own roles that grant access to reporting features using <<kibana-privileges, {kib} privileges>>. the option to create your own roles that grant access to reporting features using <<kibana-privileges, {kib} privileges>>.
It is recommended that you set `xpack.reporting.roles.enabled: false` in your kibana.yml to begin using Kibana It is recommended that you set `xpack.reporting.roles.enabled: false` in your kibana.yml to begin using Kibana