Loading

Roles and privileges

Use Kibana roles and privileges to grant users access to Fleet and Integrations. Fleet and integrations privileges can be set to:

all
Grants full read-write access.
read
Grants read-only access.
none
No access is granted.

You can take advantage of these privilege settings by:

To configure access at a more granular level, select a custom set of privileges for individual Fleet features:

Elasticsearch comes with built-in roles that include default privileges.

editor

The built-in editor role grants these privileges, supporting full read-write access to Fleet and Integrations:

  • Fleet: all
  • Integrations: all
viewer
The built-in viewer role grants these privileges, supporting read-only access to Fleet and Integrations:
  • Fleet:: read
  • Integrations:: read

You can also create a new role that can be assigned to a user, in order to grant more specific levels of access to Fleet and Integrations.

To create a new role with access to Fleet and Integrations:

  1. In Kibana, go to Management → Stack Management.

  2. In the Security section, select Roles.

  3. Select Create role.

  4. Specify a name for the role.

  5. Leave the Elasticsearch settings at their defaults, or refer to Security privileges for descriptions of the available settings.

  6. In the Kibana section, select Assign to space.

  7. In the Spaces menu, select All Spaces. Because many Integrations assets are shared across spaces, users need the Kibana privileges in all spaces.

  8. Expand the Management section.

  9. Set Fleet privileges to All.

  10. Choose the access level that you'd like the role to have with respect to Fleet and integrations:

    1. To grant the role full access to use and manage Fleet and integrations, set both the Fleet and Integrations privileges to All.
    Kibana privileges flyout showing Fleet and Integrations access set to All
    1. To create a read-only user for Fleet and Integrations, set both the Fleet and Integrations privileges to Read.
    Kibana privileges flyout showing Fleet and Integrations access set to All
    1. If you'd like to define more specialized access to Fleet based on individual components, expand the Fleet menu and enable Customize sub-feature privileges.
    Kibana customize sub-feature privileges UI


    Any setting for individual Fleet components that you specify here takes precedence over the general All, Read, or None privilege set for Fleet.

    Based on your selections, access to features in the Fleet UI are enabled or disabled for the role. Those details are covered in the next section: Customize access to Fleet features.

After you've created a new role, you can assign it to any Elasticsearch user. You can edit the role at any time by returning to the Roles page in Kibana.

Stack Planned

Beginning with Elastic Stack version 9.1, you have more granular control when creating a new role or editing it. This is useful when people in your organization access Fleet for different purposes, and you need to fine-tune the components that they can view and the actions that they can perform.

The Fleet UI varies depending on the privileges granted to the role.

Set Read access for Elastic Agents only:

  • Agents: Read
  • Agent policies: None
  • Settings: None

With these privileges, the Fleet UI shows only the Agents and Data streams tabs. The Agent policies, Enrollment tokens, Uninstall tokens, and Settings tabs are unavailable.

The set of actions available for an agent are limited to viewing the agent and requesting a diagnostics bundle.

Fleet UI showing only the Agents and Data streams tabs

Change the Agents privilege to All to enable the role to perform the full set of available actions on Elastic Agents.

Set Read access for Elastic Agents, agent policies, and Fleet settings:

  • Agents: Read
  • Agent policies: Read
  • Settings: Read

With these privileges, the Fleet UI shows the Agents, Agent policies, Data streams, and Settings tabs. The Enrollment tokens and Uninstall tokens tabs are unavailable.

The set of actions available for an agent are limited to viewing the agent and requesting a diagnostics bundle.

You can view agent policies, but you cannot create a new policy.

Fleet UI showing four tabs available

You can view Fleet settings, but they are not editable.

Fleet UI showing settings are non-editable

Set All access for Elastic Agents only:

  • Agents: All
  • Agent policies: Read
  • Settings: Read

With these privileges, the Fleet UI shows all tabs.

All Elastic Agent actions can be performed and new agents can be created. Enrollment tokens and uninstall tokens are both available.

Fleet UI showing all tabs available

Access to Fleet settings is still read-only. To enable actions such as creating a new Fleet Server, set the Fleet Settings privilege to All.

Stack Planned

This table shows the set of available actions for the read or all privilege for each Fleet feature.

Component read privilege all privilege
Agents View-only access to Elastic Agents, including:

* View a list of all agents and their status
* Request agent diagnostic packages
Full access to manage Elastic Agents, including:

* Perform upgrades
* Configure monitoring
* Migrate agents to a new cluster
* Unenroll agents from Fleet
* Set the inactivity timeout
* Create and revoke enrollment tokens
Agent policies View-only access, including:

* Agent policies and settings
* The integrations associated with a policy
Full access to manage agent policies, including:

* Create a policy
* Add an integration to a policy
* Apply a policy
* Edit or delete an integration
* Copy a policy
* Edit or delete a policy
* Change the output of a policy
Fleet settings View-only access, including:

* Configured Fleet hosts
* Fleet output settings
* The location to download agent binaries
Full access to manage Fleet settings, including:

* Editing hosts
* Adding or editing outputs
* Update the location for downloading agent binaries