API Keys
editAPI Keys
editAPI keys enable you to create secondary credentials so that you can send requests on behalf of the user. Secondary credentials have the same or lower access rights.
For example, if you extract data from an Elasticsearch cluster on a daily basis, you might create an API key tied to your credentials, configure it with minimum access, and then put the API credentials into a cron job. Or, you might create API keys to automate ingestion of new data from remote sources, without a live user interaction.
You can create API keys from the Kibana Console. To view and invalidate API keys, use Management > Security > API Keys.
Elasticsearch API key service
editThe Elasticsearch API key service is automatically enabled when you configure TLS on the HTTP interface. This ensures that clients are unable to send API keys in clear-text.
When HTTPS connections are not enabled between Kibana and Elasticsearch, you cannot create or manage API keys, and you get an error message. For more information, see the Elasticsearch API key documentation, or contact your system administrator.
Security privileges
editYou must have the manage_security
, manage_api_key
, or the manage_own_api_key
cluster privileges to use API keys in Kibana. You can manage roles in
Management > Security > Roles, or use the Kibana Role Management API.
Create an API key
editYou can create an API key from the Kibana Console. For example:
POST /_security/api_key { "name": "my_api_key", "expiration": "1d" }
This creates an API key with the name my_api_key
that
expires after one day. API key names must be globally unique.
An expiration date is optional and follows Elasticsearch time unit format.
When an expiration is not provided, the API key does not expire.
View and invalidate API keys
editThe API Keys UI lists your API keys, including the name, date created,
and expiration date. If an API key expires, its status changes from Active
to Expired
.
If you have manage_security
or manage_api_key
permissions,
you can view the API keys of all users, and see which API key was
created by which user in which realm.
If you have only the manage_own_api_key
permission, you see only a list of your own keys.
You can invalidate API keys individually or in bulk. Invalidated keys are deleted in batch after seven days.
You cannot modify an API key. If you need additional privileges, you must create a new key with the desired configuration and invalidate the old key.