[7.x] Doc changes for stack management and grouped feature privileges (#80486) (#81795)

Co-authored-by: Kaarina Tungseth <kaarina.tungseth@elastic.co>
Co-authored-by: gchaps <33642766+gchaps@users.noreply.github.com>
# Conflicts:
#	docs/images/intro-spaces.jpg
This commit is contained in:
Larry Gregory 2020-10-27 11:54:41 -04:00 committed by GitHub
parent b947f35200
commit 7745a54cb6
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
22 changed files with 63 additions and 2 deletions

View file

@ -11,6 +11,13 @@ values.
. Enter a new value for the setting.
. Click *Save changes*.
[float]
=== Required permissions
The `Advanced Settings` {kib} privilege is required to access *Advanced Settings*.
To add the privilege, open the menu, then click *Stack Management > Roles*.
[float]
[[settings-read-only-access]]

View file

@ -24,3 +24,8 @@ The *Alerts and Actions* UI only shows alerts and connectors for the current spa
can be managed through the <<watcher-ui, Watcher UI>>. See
<<alerting-concepts-differences>> for more information.
============================================================================
[float]
=== Required permissions
Access to alerts and actions is granted based on your privileges to alerting-enabled features. See <<alerting-security, Alerting Security>> for more information.

View file

@ -29,6 +29,13 @@ more information, see https://www.elastic.co/subscriptions and
enrollment and configuration process step by step the first time you use the
Central Management UI.
[float]
=== Required permissions
You must have the `beats_admin` role assigned to use **{beats} Central Management**
To assign the role, open the menu, then click *Stack Management > Users*.
[float]
=== Enroll {beats}

View file

@ -7,6 +7,13 @@ the index patterns that retrieve your data from {es}.
[role="screenshot"]
image::images/management-index-patterns.png[]
[float]
=== Required permissions
The `Index Pattern Management` {kib} privilege is required to access the *Index patterns* UI.
To add the privilege, open the menu, then click *Stack Management > Roles*.
[float]
=== Create an index pattern

View file

@ -10,6 +10,16 @@ To get started, open the main menu, then click *Stack Management > Saved Objects
[role="screenshot"]
image::images/management-saved-objects.png[Saved Objects]
[float]
=== Required permissions
The `Saved Objects Management` {kib} privilege is required to access the *Saved Objects* UI.
To add the privilege, open the menu, then click *Stack Management > Roles*.
NOTE:
Granting access to Saved Objects Management will authorize users to manage all saved objects in {kib}, including objects that are managed by applications they may not otherwise be authorized to access.
[float]
[[managing-saved-objects-view]]

Binary file not shown.

Before

Width:  |  Height:  |  Size: 136 KiB

After

Width:  |  Height:  |  Size: 220 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 148 KiB

After

Width:  |  Height:  |  Size: 350 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 626 KiB

After

Width:  |  Height:  |  Size: 248 KiB

Before After
Before After

BIN
docs/spaces/images/spaces-roles.png Executable file → Normal file

Binary file not shown.

Before

Width:  |  Height:  |  Size: 390 KiB

After

Width:  |  Height:  |  Size: 517 KiB

Before After
Before After

View file

@ -25,6 +25,11 @@ Kibana supports spaces in several ways. You can:
* <<spaces-default-route, Configure a Space-level landing page>>
* <<spaces-delete-started, Disable the Spaces feature>>
[float]
==== Required permissions
The `kibana_admin` role or equivilent is required to manage **Spaces**.
[float]
[[spaces-managing]]
=== View, create, and delete spaces

View file

@ -112,7 +112,7 @@ You can even choose which features to enable within each space. Dont need
Machine learning in your “Executive” space? Simply turn it off.
[role="screenshot"]
image::images/intro-spaces.jpg[]
image::images/intro-spaces.png[Space selector screen]
You can take this all one step further with Kibanas security features, and
control which users have access to each space. {kib} allows for fine-grained

Binary file not shown.

Before

Width:  |  Height:  |  Size: 179 KiB

After

Width:  |  Height:  |  Size: 248 KiB

Before After
Before After

View file

@ -6,6 +6,10 @@
*Stack Management* is home to UIs for managing all things Elastic Stack&mdash;
indices, clusters, licenses, UI settings, index patterns, spaces, and more.
Access to individual features is governed by {es} and {kib} privileges.
Consult your administrator if you do not have the appropriate access.
[float]
[[manage-ingest]]
== Ingest

View file

@ -13,7 +13,12 @@ you cannot use `kibana_admin` to grant access. You must create custom roles that
[[kibana-role-management]]
=== {kib} role management
To create a role that grants {kib} privileges, open the main menu, click *Stack Management > Roles*, then click *Create role*.
To create a role that grants {kib} privileges, open the menu, then click *Stack Management > Roles* and click **Create role**.
[float]
==== Required permissions
The `manage_security` cluster privilege is required to access role management.
[[adding_kibana_privileges]]
==== Adding {kib} privileges

BIN
docs/user/security/images/add-space-privileges.png Executable file → Normal file

Binary file not shown.

Before

Width:  |  Height:  |  Size: 221 KiB

After

Width:  |  Height:  |  Size: 384 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 405 KiB

After

Width:  |  Height:  |  Size: 370 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 106 KiB

After

Width:  |  Height:  |  Size: 417 KiB

Before After
Before After

BIN
docs/user/security/images/privilege-example-1.png Executable file → Normal file

Binary file not shown.

Before

Width:  |  Height:  |  Size: 216 KiB

After

Width:  |  Height:  |  Size: 254 KiB

Before After
Before After

Binary file not shown.

Before

Width:  |  Height:  |  Size: 97 KiB

After

Width:  |  Height:  |  Size: 278 KiB

Before After
Before After

BIN
docs/user/security/images/view-privilege-summary.png Executable file → Normal file

Binary file not shown.

Before

Width:  |  Height:  |  Size: 151 KiB

After

Width:  |  Height:  |  Size: 166 KiB

Before After
Before After

View file

@ -10,6 +10,12 @@ auditing. For more information, see
{ref}/secure-cluster.html[Secure a cluster] and
<<using-kibana-with-security,Configuring Security in {kib}>>.
[float]
=== Required permissions
The `manage_security` cluster privilege is required to access all Security features.
[float]
=== Users

View file

@ -19,6 +19,11 @@ With *Role mappings*, you can:
[role="screenshot"]
image:user/security/role-mappings/images/role-mappings-grid.png["Role mappings"]
[float]
==== Required permissions
The `manage_security` cluster privilege is required to manage Role Mappings.
[float]
=== Create a role mapping