WARNING: Version 5.6 of Kibana has passed its EOL date.
This documentation is no longer being maintained and may be removed. If you are running this version, we strongly advise you to upgrade. For the latest information, see the current release documentation.
Reporting and Security
editReporting and Security
editReporting operates by creating and updating documents in Elasticsearch in response to user actions in Kibana.
To use X-Pack reporting with X-Pack security enabled, you need to set up Kibana to work with X-Pack security. If you are automatically generating reports with Watcher, you also need to configure Watcher to trust the Kibana server’s certificate. For more information, see Securing the Reporting Endpoints.
To enable users to generate reports, assign them the built in reporting_user
and kibana_user
roles:
-
If you’re using the
native
realm, you can assign roles through Management / Users UI in Kibana or with theuser
API. For example, the following request creates areporter
user that has thereporting_user
andkibana_user
roles:POST /_xpack/security/user/reporter { "password" : "x-pack-test-password", "roles" : ["kibana_user", "reporting_user"], "full_name" : "Reporting User" }
-
If you are using an LDAP or Active Directory realm, you can either assign roles on a per user basis, or assign roles to groups of users. By default, role mappings are configured in
config/shield/role_mapping.yml
. For example, the following snippet assigns the user named Bill Murray thekibana_user
andreporting_user
roles:kibana_user: - "cn=Bill Murray,dc=example,dc=com" reporting_user: - "cn=Bill Murray,dc=example,dc=com"