-
Notifications
You must be signed in to change notification settings - Fork 357
Description
What is the bug?
I set all_access role to my user and set set node config like below:
plugins.security.restapi.roles_enabled: [ all_access, security_rest_api_access ]
plugins.security.restapi.admin.enabled: true
plugins.security.nodes_dn_dynamic_config_enabled: true
plugins.security.ssl_cert_reload_enabled: trueand my all_access has all permissions like below:
{
"all_access" : {
"reserved" : true,
"hidden" : false,
"description" : "Allow full access to all indices and all cluster APIs",
"cluster_permissions" : [
"*"
],
"index_permissions" : [
{
"index_patterns" : [
"*"
],
"fls" : [ ],
"masked_fields" : [ ],
"allowed_actions" : [
"*"
]
}
],
...However, I am still unable to access super admin security APIs (e.g., allowlist, ssl/certs, nodesdn) by default. Access works only if I explicitly assign granular permissions like restapi:admin/allowlist to my account. Is it intentional that the wildcard cluster_permissions does not inherit these permissions?"
How can one reproduce the bug?
Steps to reproduce the behavior:
- Assign
all_accessto my account. I used clientcert authentication. - Call
_plugins/_security/api/ssl/certsand See{ "status" : "FORBIDDEN", "message" : "Access denied" } - Assign
restapi:admin/ssl/certs/infoexplicitly - Call
_plugins/_security/api/ssl/certsand See 200 response
What is the expected behavior?
Access any API with wildcard permission if it's enabled
What is your host/environment?
- OS: OSX 15.7
- Version: 3.4.0
- Plugins
Do you have any screenshots?
If applicable, add screenshots to help explain your problem.
Do you have any additional context?
Add any other context about the problem.