I have enabled security in elasticsearch and kibana.
I have created a user with only the built-in kibana_user role assigned to it.
It seems this user can create other users and assign whatever role he wants to them, also edit its own user roles like for example add the superuser role... this can't be normal?
Elasticsearch version 6.8.1
Kibana runs on one of the master nodes
Apparently, when this is enabled, the user that is authenticating in Kibana also gets assigned the role that has been set for the anonymous user.
Is this expected behaviour...?
Hey @gregorys, it's "expected" in that it's a known bug we need to fix. https://github.com/elastic/kibana/issues/35613 discusses some aspects of the current behavior, and why Kibana does what it does. Elasticsearch treats the anonymous user as the set of privileges that all users are granted. For example, if you enable the anonymous user in Elasticsearch and then you authenticate and provide the credentials for a user with no roles, they'll get the privileges of the anonymous user. The only way to overcome this behavior is to no longer use the anonymous user in Elasticsearch.
Ideally, would Kibana no longer require the end-user to login in your situation and automatically allow them to be authenticated as the anonymous user?
Thanks for the clarification.
The anonymous access in our situation is just for a temporary period, to allow all integrations to add security to the elasticsearch output.
I'll create a new role with more strict permissions, and assign this role for anonymous access.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.