[DOCS] Fixes inconsistency with role management link (#121351)

* [DOCS] Fixes inconsistency with role management link

* Update docs/redirects.asciidoc

Co-authored-by: Lisa Cawley <lcawley@elastic.co>

Co-authored-by: Lisa Cawley <lcawley@elastic.co>
This commit is contained in:
gchaps 2021-12-15 14:45:23 -08:00 committed by GitHub
parent ebafec2c4e
commit 1e12a39cd2
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
7 changed files with 15 additions and 10 deletions

View file

@ -12,10 +12,10 @@ or all indices that contain your data.
[[data-views-read-only-access]] [[data-views-read-only-access]]
=== Required permissions === Required permissions
* Access to *Data Views* requires the <<xpack-kibana-role-management, {kib} privilege>> * Access to *Data Views* requires the <<kibana-role-management, {kib} privilege>>
`Data View Management`. `Data View Management`.
* To create a data view, you must have the <<xpack-kibana-role-management,{es} privilege>> * To create a data view, you must have the <<kibana-role-management,{es} privilege>>
`view_index_metadata`. `view_index_metadata`.
* If a read-only indicator appears in {kib}, you have insufficient privileges * If a read-only indicator appears in {kib}, you have insufficient privileges

View file

@ -123,7 +123,7 @@ Documents are indexed using a preconfigured schema that captures the <<defining-
[IMPORTANT] [IMPORTANT]
============================================== ==============================================
To write documents to the preconfigured index, you must have `all` or `write` privileges to the `kibana-alert-history-*` indices. Refer to <<xpack-kibana-role-management>> for more information. To write documents to the preconfigured index, you must have `all` or `write` privileges to the `kibana-alert-history-*` indices. Refer to <<kibana-role-management>> for more information.
============================================== ==============================================
[NOTE] [NOTE]

View file

@ -17,7 +17,7 @@ The {stack-security-features} provide roles and privileges that control which us
You can manage your roles, privileges, and You can manage your roles, privileges, and
spaces in **{stack-manage-app}** in {kib}. For more information, see spaces in **{stack-manage-app}** in {kib}. For more information, see
{ref}/security-privileges.html[Security privileges], {ref}/security-privileges.html[Security privileges],
<<kibana-privileges, {kib} privileges>>, and <<xpack-kibana-role-management, {kib} role management>>. <<kibana-privileges, {kib} privileges>>, and <<kibana-role-management, {kib} role management>>.
To upload GeoJSON files in {kib} with *Maps*, you must have: To upload GeoJSON files in {kib} with *Maps*, you must have:

View file

@ -440,3 +440,8 @@ This content has moved. Refer to <<data-views-runtime-field-api-upsert>>.
== Index patterns has been renamed to data views. == Index patterns has been renamed to data views.
This content has moved. Refer to <<data-views-api-update>>. This content has moved. Refer to <<data-views-api-update>>.
[role="exclude",id="xpack-kibana-role-management"]
== Kibana role management.
This content has moved. Refer to <<kibana-role-management>>.

View file

@ -106,7 +106,7 @@ a| <<xpack-security, Users>>
Add or delete users and assign roles that give users Add or delete users and assign roles that give users
specific privileges. specific privileges.
| <<xpack-kibana-role-management, Roles>> | <<kibana-role-management, Roles>>
|View the roles that exist on your cluster. Customize |View the roles that exist on your cluster. Customize
the actions that a user with the role can perform, on a cluster, index, and space level. the actions that a user with the role can perform, on a cluster, index, and space level.

View file

@ -23,7 +23,7 @@ Whichever approach you use, be careful when granting cluster privileges and inde
cluster, and {kib} spaces do not prevent you from granting users of two different tenants access to the same index. cluster, and {kib} spaces do not prevent you from granting users of two different tenants access to the same index.
[role="xpack"] [role="xpack"]
[[xpack-kibana-role-management]] [[kibana-role-management]]
=== {kib} role management === {kib} role management
Roles are a collection of privileges that allow you to perform actions in {kib} and {es}. Users are not directly granted privileges, but are instead assigned one or more roles that describe the desired level of access. When you assign a user multiple roles, the user receives a union of the roles privileges. This means that you cannot reduce the privileges of a user by assigning them an additional role. You must instead remove or edit one of their existing roles. Roles are a collection of privileges that allow you to perform actions in {kib} and {es}. Users are not directly granted privileges, but are instead assigned one or more roles that describe the desired level of access. When you assign a user multiple roles, the user receives a union of the roles privileges. This means that you cannot reduce the privileges of a user by assigning them an additional role. You must instead remove or edit one of their existing roles.

View file

@ -131,6 +131,6 @@ This guide is an introduction to {kib}'s security features. Check out these addi
* View the <<kibana-authentication, authentication guide>> to learn more about single-sign on and other login features. * View the <<kibana-authentication, authentication guide>> to learn more about single-sign on and other login features.
* View the <<xpack-kibana-role-management, authorization guide>> to learn more about authorizing access to {kib}'s features. * View the <<kibana-role-management, authorization guide>> to learn more about authorizing access to {kib}'s features.
Still have questions? Ask on our https://discuss.elastic.co/c/kibana[Kibana discuss forum] and a fellow community member or Elastic engineer will help out. Still have questions? Ask on our https://discuss.elastic.co/c/kibana[Kibana discuss forum] and a fellow community member or Elastic engineer will help out.