[7.5] [DOCS] - fixing references to kibana_user role (#49309) (#49720)

* fixing references to kibana_user role

* Update docs/uptime-guide/security.asciidoc

Co-Authored-By: Lisa Cawley <lcawley@elastic.co>


Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
This commit is contained in:
Larry Gregory 2019-10-30 08:46:22 -04:00 committed by GitHub
parent a9db01d569
commit 8a8b042872
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
4 changed files with 6 additions and 16 deletions

View file

@ -31,17 +31,6 @@ PUT /_security/role/uptime
"allow_restricted_indices" : false
}
],
"applications" : [
{
"application" : "kibana-.kibana",
"privileges" : [
"all"
],
"resources" : [
"*"
]
}
],
"transient_metadata" : {
"enabled" : true
}
@ -52,7 +41,8 @@ PUT /_security/role/uptime
[float]
=== Assign the role to a user
Next, you'll need to create a user with both the `kibana_user`, and `uptime` roles.
Next, you'll need to create a user with both the `uptime` role, and another role with sufficient {kibana-ref}/kibana-privileges.html[Kibana privileges],
such as the `kibana_user` role.
You can do this with the following request:
["source","sh",subs="attributes,callouts"]

View file

@ -32,8 +32,8 @@ for different operating systems.
. Open {kib} in your web browser and log in. If you are running {kib}
locally, go to `http://localhost:5601`. To access {kib} and generate
reports, you need the `kibana_user` and `reporting_user` roles. For more
information, see <<secure-reporting>>.
reports, you need the `reporting_user` role, and an additional role with succifient <<kibana-privileges, Kibana privileges>>, such as the `kibana_user` role.
For more information, see <<secure-reporting>>.
. Open the dashboard, visualization, or saved search you want to include
in the report.

View file

@ -19,7 +19,7 @@ and `kibana_user` roles:
* If you're using the `native` realm, you can assign roles through
**Management / Users** UI in Kibana or with the `user` API. For example,
the following request creates a `reporter` user that has the
`reporting_user` and `kibana_user` roles:
`reporting_user` role, and another role with sufficient <<kibana-privileges, Kibana privileges>>, such as the `kibana_user` role:
+
[source, sh]
---------------------------------------------------------------

View file

@ -117,7 +117,7 @@ user you've assigned a {kib} user role. For example, you could log in as the
+
--
NOTE: This must be a user who has been assigned the `kibana_user` role.
NOTE: This must be a user who has been assigned <<kibana-privileges, Kibana privileges>>.
{kib} server credentials should only be used internally by the {kib} server.
--