[8.x] [DOCS] Granular connector RBAC (#207136) (#207263)

# Backport

This will backport the following commits from `main` to `8.x`:
- [[DOCS] Granular connector RBAC
(#207136)](https://github.com/elastic/kibana/pull/207136)

<!--- Backport version: 9.4.3 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sqren/backport)

<!--BACKPORT [{"author":{"name":"Lisa
Cawley","email":"lcawley@elastic.co"},"sourceCommit":{"committedDate":"2025-01-20T20:51:21Z","message":"[DOCS]
Granular connector RBAC
(#207136)","sha":"9d4f54a7ce9faf27d69e2443b5ad9de562a5d1ab","branchLabelMapping":{"^v9.0.0$":"main","^v8.18.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:ResponseOps","v9.0.0","documentation","Feature:Actions/ConnectorTypes","backport:version","v8.18.0"],"title":"[DOCS]
Granular connector
RBAC","number":207136,"url":"https://github.com/elastic/kibana/pull/207136","mergeCommit":{"message":"[DOCS]
Granular connector RBAC
(#207136)","sha":"9d4f54a7ce9faf27d69e2443b5ad9de562a5d1ab"}},"sourceBranch":"main","suggestedTargetBranches":["8.x"],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","branchLabelMappingKey":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/207136","number":207136,"mergeCommit":{"message":"[DOCS]
Granular connector RBAC
(#207136)","sha":"9d4f54a7ce9faf27d69e2443b5ad9de562a5d1ab"}},{"branch":"8.x","label":"v8.18.0","branchLabelMappingKey":"^v8.18.0$","isSourceBranch":false,"state":"NOT_CREATED"}]}]
BACKPORT-->

Co-authored-by: Lisa Cawley <lcawley@elastic.co>
This commit is contained in:
Kibana Machine 2025-01-21 08:22:36 +11:00 committed by GitHub
parent 85caa94b9f
commit 93db134f19
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
3 changed files with 7 additions and 2 deletions

View file

@ -12,6 +12,8 @@ preview::[]
The CrowdStrike connector communicates with CrowdStrike Management Console via REST API.
To use this connector, you must have authority to run {endpoint-sec} connectors, which is an *{connectors-feature}* sub-feature privilege. Refer to <<kibana-privileges>>.
[float]
[[define-crowdstrike-ui]]
=== Create connectors in {kib}

View file

@ -12,6 +12,8 @@ preview::[]
The SentinelOne connector communicates with SentinelOne Management Console via REST API.
To use this connector, you must have authority to run {endpoint-sec} connectors, which is an *{connectors-feature}* sub-feature privilege. Refer to <<kibana-privileges>>.
[float]
[[define-sentinelone-ui]]
=== Create connectors in {kib}

View file

@ -64,10 +64,11 @@ a|
====
The *{connectors-feature}* feature privilege is required to manage connectors.
To add rule actions and test connectors, you require only `Read` privileges.
By default, `All` privileges include authority to run {endpoint-sec} connectors (such as SentinelOne and CrowdStrike) unless you customize the sub-feature privileges.
By default, `All` privileges for the *Rules Settings* feature include authority to edit flapping detection settings unless you customize the sub-feature privileges.
Likewise, you can customize the *Rules Settings* sub-feature privileges related to flapping detection settings.
preview:[] To create a rule that uses the <<cases-action-type,Cases connector>>, you must also have `all` privileges for the *Cases* feature.
To create a rule that uses the <<cases-action-type,Cases connector>>, you must also have `All` privileges for the *Cases* feature.
The rule type also affects the privileges that are required.
For example, to create or edit {ml} rules, you must have `all` privileges for the *Analytics > {ml-app}* feature.