Skip to content
This repository has been archived by the owner on Aug 2, 2022. It is now read-only.

separate permissions from all_access #351

Open
mbchris opened this issue Nov 24, 2020 · 1 comment
Open

separate permissions from all_access #351

mbchris opened this issue Nov 24, 2020 · 1 comment
Labels
enhancement An improvement on the existing feature’s functionalities

Comments

@mbchris
Copy link

mbchris commented Nov 24, 2020

Is your feature request related to a problem? Please describe.
As documented, using index management features is only supported when caller is a member of the all_access role:

To use the ISM plugin, your user role needs to be mapped to the all_access role that gives you full access to the cluster. To learn more, see Users and roles.

This means that it is not possible to delegate index management API calls to partner systems without giving them full cluster management access .

Describe the solution you'd like

The API calls for creating/updating/deleting an ISM policy should be a separate permission which is assignable to a custom role.

e.g.

cluster:admin/opendistro/ism/get
cluster:admin/opendistro/ism/write
cluster:admin/opendistro/ism/delete
cluster:admin/opendistro/ism/retry

Describe alternatives you've considered

Additional context

@mbchris mbchris added the enhancement An improvement on the existing feature’s functionalities label Nov 24, 2020
@dbbaughe
Copy link
Contributor

This is in progress as we migrate ISM to the security model implemented by alerting/AD.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement An improvement on the existing feature’s functionalities
Projects
None yet
Development

No branches or pull requests

2 participants