- Kibana Guide: other versions:
- What is Kibana?
- What’s new in 7.12
- Kibana concepts
- Quick start
- Set up
- Install Kibana
- Configure Kibana
- Alerting and action settings
- APM settings
- Banners settings
- Development tools settings
- Graph settings
- Fleet settings
- i18n settings
- Logs settings
- Metrics settings
- Machine learning settings
- Monitoring settings
- Reporting settings
- Secure settings
- Search sessions settings
- Security settings
- Spaces settings
- Task Manager settings
- Telemetry settings
- Start and stop Kibana
- Access Kibana
- Securing access to Kibana
- Add data
- Upgrade Kibana
- Embed Kibana content in a web page
- Configure monitoring
- Configure security
- Production considerations
- Discover
- Dashboard
- Canvas
- Maps
- Machine learning
- Graph
- Observability
- APM
- Elastic Security
- Dev Tools
- Stack Monitoring
- Stack Management
- Fleet
- Reporting
- Alerting and Actions
- REST API
- Kibana plugins
- Accessibility
- Release notes
- Developer guide
Role mappings
editRole mappings
editRole mappings allow you to describe which roles to assign to your users using a set of rules. Role mappings are required when authenticating via an external identity provider, such as Active Directory, Kerberos, PKI, OIDC, or SAML.
Role mappings have no effect for users inside the native
or file
realms.
To manage your role mappings, open the main menu, then click Stack Management > Role Mappings.
With Role mappings, you can:
- View your configured role mappings
- Create/Edit/Delete role mappings
Required permissions
editThe manage_security
cluster privilege is required to manage Role Mappings.
Create a role mapping
edit- Open the main menu, then click Stack Management > Role Mappings.
- Click Create role mapping.
-
Give your role mapping a unique name, and choose which roles you wish to assign to your users.
If you need more flexibility, you can use role templates instead.
- Define the rules describing which users should receive the roles you defined. Rules can optionally grouped and nested, allowing for sophisticated logic to suite complex requirements.
- View the role mapping resources for an overview of the allowed rule types.
Example
editLet’s create a sales-users
role mapping, which assigns a sales
role to users whose username
starts with sls_
, or belongs to the executive
group.
First, we give the role mapping a name, and assign the sales
role:
Next, we define the two rules, making sure to set the group to Any are true:
Click Save role mapping once you’re finished.
On this page