kibana/x-pack/plugins/security
Larry Gregory 91b3404d25
[Feature Controls] - Secure Features API (#35841)
* restrict access to Features API

* introduce featureControls.manage capability to control calls to features api

* add snapshots

* rename manage_feature_controls api tag to features

* Revert "introduce featureControls.manage capability to control calls to features api"

This reverts commit addc149193.

* update spaces management to only call APIs if authorized

* handle 404 response when requesting features on role management page

* better variable naming

* remove unnecessary mock

* remove unused code

* remove unnecessary snapshots
2019-05-03 08:05:30 -04:00
..
common Add support for SAML IdP initiated login when user already has active session. (#33644) 2019-04-18 10:51:15 +02:00
public [Feature Controls] - Secure Features API (#35841) 2019-05-03 08:05:30 -04:00
server [Feature Controls] - Secure Features API (#35841) 2019-05-03 08:05:30 -04:00
index.d.ts Typesciptify Authenticator and move its tests to Jest. (#35750) 2019-05-02 13:32:45 +02:00
index.js Add support for SAML IdP initiated login when user already has active session. (#33644) 2019-04-18 10:51:15 +02:00
README.md Migrate x-pack-kibana source to kibana 2018-04-24 13:48:10 -07:00

Kibana Security Plugin

  1. Install the Security plugin on Kibana bin/kibana plugin --install kibana/security/latest
  2. Modify kibana.yml and add xpack.security.encryptionKey: "something_at_least_32_characters"
  3. Make sure that the following config options are also set: elasticsearch.username, elasticsearch.password, server.ssl.certificate, and server.ssl.key (see Configuring Kibana to Work with Shield)

Once done, open up the following url (assuming standard kibana config): https://localhost:5601.