I have successfully configure a role and role_mapping to allod LDAP user with a backend roles EXAMPLE-LDAP-ROLE to access to data from any index matching the pattern “dev1*”
However when I connect through kibana on the Dashboard It shows nothing and the browser console have this error
{“statusCode”:403,“error”:“Forbidden”,“message”:"no permissions for [indices:data/read/search] and User [name=uid=XXX
Here is the configuration in roles_mapping.yml
EXAMPLE-LDAP-ROLE:
reserved: false
hidden: false
users:
backend_roles:
- "EXAMPLE-LDAP-ROLE
hosts:
and_backend_roles:
And here are the configuration in roles.yml
EXAMPLE-LDAP-ROLE:
reserved: false
hidden: false
cluster_permissions:
- ‘cluster_composite_ops’
index_permissions:- index_patterns:
- ‘dev1*’
dls: ‘{ “bool”: { “must”: { “match”: { “filtre”: “dev1” }}}}’
fls:
masked_fields:
allowed_actions:- ‘read’
- ‘kibana_all_read’
I read from this other issue that the roles.yml roles configuration must also provide READ permission to ?kibana*
But I do not know how to fix my above configuration to provide permission to both “dev1*” and “?kibana*” in roles.yml syntax
Any help will be great