Managing Access Control
In previous chapters, we explored various capabilities of the Elastic Stack through different use cases, including search, data analytics, and observability. For simplicity’s sake, we have utilized the default elastic admin user for all recipes performed in this book so far. However, such practice is not recommended in real-world scenarios. In this chapter, we will delve into managing authentication and authorization within the Elastic Stack and demonstrate how to implement these security practices in concrete scenarios.
In this chapter we’re going to cover the following recipes:
- Using built-in roles
- Defining custom roles
- Granting additional privileges
- Managing and securing access to Kibana spaces
- Managing access with API keys
- Configuring single sign-on
- Mapping users and groups to roles