Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cluster Privilege for ILM policy namespaces #50130

Open
albertzaharovits opened this issue Dec 12, 2019 · 6 comments
Open

Cluster Privilege for ILM policy namespaces #50130

albertzaharovits opened this issue Dec 12, 2019 · 6 comments
Labels
>feature :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team

Comments

@albertzaharovits
Copy link
Contributor

Currently there are two cluster privileges for ILM actions manage_ilm and read_ilm. It is also possible, although not recommended, to grant privileges for specific ILM actions (the list of which is here https://www.elastic.co/guide/en/elasticsearch/reference/master/index-lifecycle-management-api.html ).

We discussed inside the Security team that a new privilege is desirable. This privilege would be granting access to policy management APIs (a subset of ILM actions, create, get and delete policy actions) . Moreover it must be a form of "configurable cluster privilege" such that the privilege can work on a restricted namespace of the policies.

This would prevent users that, even if they don't have privileges to assign a particular policy to an index, they can nonetheless alter the existing policy assigned to that index. The new privilege would permit the administrator to segment the policy namespace.

@elastic/es-core-features Can I get your thumbs up on this approach?

Given #49451 we should be working on this soon-ish.

@albertzaharovits albertzaharovits added >feature :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC labels Dec 12, 2019
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security (:Security/Authorization)

@dakrone
Copy link
Member

dakrone commented Dec 13, 2019

@albertzaharovits let me make sure I understand you. You want to add a new cluster privilege that allows only for:

  • Create/Update a policy
  • Delete a policy
  • Retrieve a policy

And prevents other actions like retrying, or move-to-step.

Is that correct?

@albertzaharovits
Copy link
Contributor Author

@dakrone That is correct.

In addition, the administrator would be able to define a namespace for the policies that can be accessed in the modes you listed. This is something new for the Security space as well.
For example:
"manage_ilm_policy": { "policies": ".kibana*"} would allow create/update/delete/retrieve policies but only those policies named with a leading ".kibana" prefix.

@dakrone
Copy link
Member

dakrone commented Dec 13, 2019

Okay, thanks for clarifying @albertzaharovits, for the policy name, I assume that would match the policy ID as given in the URL right (or be a wildcard)?

@albertzaharovits
Copy link
Contributor Author

The wildcard in the permission must match the policy ID from the URL.

@dakrone
Copy link
Member

dakrone commented Dec 17, 2019

This sounds good to the ILM team. One thing that came up in discussion, is this something we would also want to do for SLM in the future? (It wouldn't have to be done at the same time, just a future discussion)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
>feature :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team
Projects
None yet
Development

No branches or pull requests

4 participants