Bez popisu

roles_mapping.yml 1.3KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778
  1. ---
  2. # In this file users, backendroles and hosts can be mapped to Wazuh indexer Security roles.
  3. # Permissions for Wazuh indexer roles are configured in roles.yml
  4. _meta:
  5. type: "rolesmapping"
  6. config_version: 2
  7. # Define your roles mapping here
  8. ## Demo roles mapping
  9. all_access:
  10. reserved: false
  11. backend_roles:
  12. - "admin"
  13. description: "Maps admin to all_access"
  14. own_index:
  15. reserved: false
  16. users:
  17. - "*"
  18. description: "Allow full access to an index named like the username"
  19. logstash:
  20. reserved: false
  21. backend_roles:
  22. - "logstash"
  23. kibana_user:
  24. reserved: false
  25. backend_roles:
  26. - "kibanauser"
  27. users:
  28. - "wazuh_user"
  29. - "wazuh_admin"
  30. description: "Maps kibanauser to kibana_user"
  31. readall:
  32. reserved: false
  33. backend_roles:
  34. - "readall"
  35. manage_snapshots:
  36. reserved: false
  37. backend_roles:
  38. - "snapshotrestore"
  39. kibana_server:
  40. reserved: true
  41. users:
  42. - "kibanaserver"
  43. wazuh_ui_admin:
  44. reserved: true
  45. hidden: false
  46. backend_roles: []
  47. hosts: []
  48. users:
  49. - "wazuh_admin"
  50. - "kibanaserver"
  51. and_backend_roles: []
  52. wazuh_ui_user:
  53. reserved: true
  54. hidden: false
  55. backend_roles: []
  56. hosts: []
  57. users:
  58. - "wazuh_user"
  59. and_backend_roles: []
  60. # ISM API permissions role mapping
  61. manage_ism:
  62. reserved: true
  63. hidden: false
  64. users:
  65. - "kibanaserver"