Know How Guide and Hands on Guide for AWS
When you authentication for Kibana, you can
Elasticsearch 6.7 or later. To use this feature, you must enable fine-grained access control.{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": [
"*"
]
},
"Action": [
"es:*"
],
"Resource": "arn:aws-cn:es:cn-north-1:account:domain/domain-name/*"
}
]
}
Sign in Kibana using TheMasterUser and Try our sample data for Sample flight data
Security->Internal User Database->Create internal user with name new-userSecurity->Role->Create role with name new-flight-role
Index Permissions specify the kibana_sample_data_fli* as index patternaction group as readDocument Level Security Query with
{
"match": {
"FlightDelay": true
}
}
Exclude fields with FlightNum with Dest`Security->Role Mappings
new-user with new-flight-rolenew-user with kibana_usernew-user
GET _search
{
"query": {
"match_all": {}
}
}
Failed with error no permissions for [indices:data/read/search] and User [name=new-user, backend_roles=[], requestedTenant=__user__]
kibana_sample_data_flights
GET kibana_sample_data_flights/_search
{
"query": {
"match_all": {}
}
}
Return the index documents
TheMasterUser, all queries can Return the index documentsLimitations for internal user database authentication
Users in the internal user database can’t change their own passwords. Master users (or users with equivalent permissions) must change their passwords for them.