built-in-roles.asciidoc 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225
  1. [role="xpack"]
  2. [[built-in-roles]]
  3. === Built-in roles
  4. The {stack-security-features} apply a default role to all users, including
  5. <<anonymous-access, anonymous users>>. The default role enables users to access
  6. the authenticate endpoint, change their own passwords, and get information about
  7. themselves.
  8. There is also a set of built-in roles you can explicitly assign to users. These
  9. roles have a fixed set of privileges and cannot be updated.
  10. [[built-in-roles-apm-system]] `apm_system` ::
  11. Grants access necessary for the APM system user to send system-level data
  12. (such as monitoring) to {es}.
  13. [[built-in-roles-apm-user]] `apm_user` ::
  14. Grants the privileges required for APM users (such as `read` and
  15. `view_index_metadata` privileges on the `apm-*` and `.ml-anomalies*` indices).
  16. deprecated:[7.13.0,"See {kibana-ref}/apm-app-users.html[APM app users and privileges\] for alternatives."].
  17. [[built-in-roles-beats-admin]] `beats_admin` ::
  18. Grants access to the `.management-beats` index, which contains configuration
  19. information for the Beats.
  20. [[built-in-roles-beats-system]] `beats_system` ::
  21. Grants access necessary for the Beats system user to send system-level data
  22. (such as monitoring) to {es}.
  23. +
  24. --
  25. [NOTE]
  26. ===============================
  27. * This role should not be assigned to users as the granted permissions may
  28. change between releases.
  29. * This role does not provide access to the beats indices and is not
  30. suitable for writing beats output to {es}.
  31. ===============================
  32. --
  33. [[built-in-roles-data-frame-transforms-admin]] `data_frame_transforms_admin` ::
  34. Grants `manage_data_frame_transforms` cluster privileges, which enable you to
  35. manage {transforms}. This role also includes all
  36. {kibana-ref}/kibana-privileges.html[Kibana privileges] for the {ml-features}.
  37. deprecated:[7.5.0,"Replaced by <<built-in-roles-transform-admin,`transform_admin`>>"].
  38. [[built-in-roles-data-frame-transforms-user]] `data_frame_transforms_user` ::
  39. Grants `monitor_data_frame_transforms` cluster privileges, which enable you to
  40. use {transforms}. This role also includes all
  41. {kibana-ref}/kibana-privileges.html[Kibana privileges] for the {ml-features}.
  42. deprecated:[7.5.0,"Replaced by <<built-in-roles-transform-user,`transform_user`>>"].
  43. [[built-in-roles-editor]] `editor` ::
  44. experimental:[]
  45. Grants full access to all features in {kib} (including Solutions) and read-only access to data indices.
  46. +
  47. --
  48. [NOTE]
  49. ===============================
  50. * This role provides read access to any index that is not prefixed with a dot.
  51. * This role automatically grants full access to new {kib} features as soon as they are released.
  52. ===============================
  53. --
  54. [[built-in-roles-enrich-user]] `enrich_user` ::
  55. Grants access to manage *all* enrich indices (`.enrich-*`) and *all* operations on
  56. ingest pipelines.
  57. [[built-in-roles-ingest-user]] `ingest_admin` ::
  58. Grants access to manage *all* index templates and *all* ingest pipeline configurations.
  59. +
  60. NOTE: This role does *not* provide the ability to create indices; those privileges
  61. must be defined in a separate role.
  62. [[built-in-roles-kibana-dashboard]] `kibana_dashboard_only_user` ::
  63. (This role is deprecated, please use
  64. {kibana-ref}/kibana-privileges.html#kibana-feature-privileges[{kib} feature privileges]
  65. instead).
  66. Grants read-only access to the {kib} Dashboard in every
  67. {kibana-ref}/xpack-spaces.html[space in {kib}].
  68. This role does not have access to editing tools in {kib}.
  69. [[built-in-roles-kibana-system]] `kibana_system` ::
  70. Grants access necessary for the {kib} system user to read from and write to the
  71. {kib} indices, manage index templates and tokens, and check the availability of
  72. the {es} cluster. This role grants read access to the `.monitoring-*` indices
  73. and read and write access to the `.reporting-*` indices. For more information,
  74. see {kibana-ref}/using-kibana-with-security.html[Configuring Security in {kib}].
  75. +
  76. NOTE: This role should not be assigned to users as the granted permissions may
  77. change between releases.
  78. [[built-in-roles-kibana-admin]] `kibana_admin`::
  79. Grants access to all features in {kib}. For more information on {kib} authorization,
  80. see {kibana-ref}/xpack-security-authorization.html[Kibana authorization].
  81. [[built-in-roles-kibana-user]] `kibana_user`::
  82. (This role is deprecated, please use the
  83. <<built-in-roles-kibana-admin,`kibana_admin`>> role instead.)
  84. Grants access to all features in {kib}. For more information on {kib} authorization,
  85. see {kibana-ref}/xpack-security-authorization.html[Kibana authorization].
  86. [[built-in-roles-logstash-admin]] `logstash_admin` ::
  87. Grants access to the `.logstash*` indices for managing configurations, and grants
  88. necessary access for logstash-specific APIs exposed by the logstash x-pack plugin.
  89. [[built-in-roles-logstash-system]] `logstash_system` ::
  90. Grants access necessary for the Logstash system user to send system-level data
  91. (such as monitoring) to {es}. For more information, see
  92. {logstash-ref}/ls-security.html[Configuring Security in Logstash].
  93. +
  94. --
  95. [NOTE]
  96. ===============================
  97. * This role should not be assigned to users as the granted permissions may
  98. change between releases.
  99. * This role does not provide access to the logstash indices and is not
  100. suitable for use within a Logstash pipeline.
  101. ===============================
  102. --
  103. [[built-in-roles-ml-admin]] `machine_learning_admin`::
  104. Provides all of the privileges of the `machine_learning_user` role plus the full
  105. use of the {ml} APIs. Grants `manage_ml` cluster privileges, read access to
  106. `.ml-anomalies*`, `.ml-notifications*`, `.ml-state*`, `.ml-meta*` indices and
  107. write access to `.ml-annotations*` indices. {ml-cap} administrators also need
  108. index privileges for source and destination indices and roles that grant
  109. access to {kib}. See {ml-docs-setup-privileges}.
  110. [[built-in-roles-ml-user]] `machine_learning_user`::
  111. Grants the minimum privileges required to view {ml} configuration,
  112. status, and work with results. This role grants `monitor_ml` cluster privileges,
  113. read access to the `.ml-notifications` and `.ml-anomalies*` indices
  114. (which store {ml} results), and write access to `.ml-annotations*` indices.
  115. {ml-cap} users also need index privileges for source and destination
  116. indices and roles that grant access to {kib}. See {ml-docs-setup-privileges}.
  117. [[built-in-roles-monitoring-user]] `monitoring_user`::
  118. Grants the minimum privileges required for any user of {monitoring} other than those
  119. required to use {kib}. This role grants access to the monitoring indices and grants
  120. privileges necessary for reading basic cluster information. This role also includes
  121. all {kibana-ref}/kibana-privileges.html[Kibana privileges] for the {stack-monitor-features}.
  122. Monitoring users should also be assigned the `kibana_admin` role, or another role
  123. with {kibana-ref}/xpack-security-authorization.html[access to the {kib} instance].
  124. [[built-in-roles-remote-monitoring-agent]] `remote_monitoring_agent`::
  125. Grants the minimum privileges required to write data into the monitoring indices
  126. (`.monitoring-*`). This role also has the privileges necessary to create
  127. {metricbeat} indices (`metricbeat-*`) and write data into them.
  128. [[built-in-roles-remote-monitoring-collector]] `remote_monitoring_collector`::
  129. Grants the minimum privileges required to collect monitoring data for the {stack}.
  130. [[built-in-roles-reporting-user]] `reporting_user`::
  131. Grants the specific privileges required for users of {reporting} other than those
  132. required to use {kib}. This role grants access to the reporting indices; each
  133. user has access to only their own reports.
  134. Reporting users should also be assigned additional roles that grant
  135. {kibana-ref}/xpack-security-authorization.html[access to {kib}] as well as read
  136. access to the <<roles-indices-priv,indices>> that will be used to generate reports.
  137. [[built-in-roles-snapshot-user]] `snapshot_user`::
  138. Grants the necessary privileges to create snapshots of **all** the indices and
  139. to view their metadata. This role enables users to view the configuration of
  140. existing snapshot repositories and snapshot details. It does not grant authority
  141. to remove or add repositories or to restore snapshots. It also does not enable
  142. to change index settings or to read or update data stream or index data.
  143. [[built-in-roles-superuser]] `superuser`::
  144. Grants full access to cluster management and data indices. This role also grants
  145. direct read-only access to restricted indices like `.security`. A user with the
  146. `superuser` role can <<run-as-privilege, impersonate>> any other user in the system.
  147. +
  148. On {ecloud}, all standard users, including those with the `superuser` role are
  149. restricted from performing <<operator-only-functionality,operator-only>> actions.
  150. +
  151. IMPORTANT: This role can manage security and create roles with unlimited privileges.
  152. Take extra care when assigning it to a user.
  153. [[built-in-roles-transform-admin]] `transform_admin`::
  154. Grants `manage_transform` cluster privileges, which enable you to manage
  155. {transforms}. This role also includes all
  156. {kibana-ref}/kibana-privileges.html[Kibana privileges] for the {ml-features}.
  157. [[built-in-roles-transform-user]] `transform_user`::
  158. Grants `monitor_transform` cluster privileges, which enable you to perform
  159. read-only operations related to {transforms}. This role also includes all
  160. {kibana-ref}/kibana-privileges.html[Kibana privileges] for the {ml-features}.
  161. [[built-in-roles-transport-client]] `transport_client`::
  162. Grants the privileges required to access the cluster through the Java Transport
  163. Client. The Java Transport Client fetches information about the nodes in the
  164. cluster using the _Node Liveness API_ and the _Cluster State API_ (when
  165. sniffing is enabled). Assign your users this role if they use the
  166. Transport Client.
  167. +
  168. NOTE: Using the Transport Client effectively means the users are granted access
  169. to the cluster state. This means users can view the metadata over all indices,
  170. index templates, mappings, node and basically everything about the cluster.
  171. However, this role does not grant permission to view the data in all indices.
  172. [[built-in-roles-viewer]] `viewer` ::
  173. experimental:[]
  174. Grants read-only access to all features in {kib} (including Solutions) and to data indices.
  175. +
  176. --
  177. [NOTE]
  178. ===============================
  179. * This role provides read access to any index that is not prefixed with a dot.
  180. * This role automatically grants read-only access to new {kib} features as soon as they are available.
  181. ===============================
  182. --
  183. [[built-in-roles-watcher-admin]] `watcher_admin`::
  184. +
  185. Allows users to create and execute all {watcher} actions. Grants read access to
  186. the `.watches` index. Also grants read access to the watch history and the
  187. triggered watches index.
  188. [[built-in-roles-watcher-user]] `watcher_user`::
  189. +
  190. Grants read access to the `.watches` index, the get watch action and the watcher
  191. stats.