Greetings!
I was trying to configure a read-only user who would only have access to save visualizations. Referred https://documentation.wazuh.com/current/user-manual/api/rbac/index.html but was not able to fulfill the requirement.
I still get the pop-up message at bottom right corner as - Error on saving 'xyz name' . Forbidden.
Does it have to do anything with https://github.com/opensearch-project/security-dashboards-plugin/issues/916#issuecomment-1554076384 comment?
Please advise and guide a way forward.
Thanks, KS
Hi Khul Sat,
Hope you are doing well. Thank you for using Wazuh.
I think you are referring to creating an internal user.
Check this document for detailed guidelines to create and map internal users.
https://documentation.wazuh.com/current/user-manual/user-administration/rbac.html
There is also a use case to create read-only user:
If you still face issues. Please let me know.
Regards
Md. Nazmur Sakib
Hi Khul Sat,
I hope you are doing well.
To achieve this.
Click the upper-left menu icon ☰ to open the available options and click Wazuh.
Click Wazuh to open the Wazuh dashboard menu, select Security, and Click Roles to open the tab, click Create Role, and fill in the empty fields with the requested information.
Role name: Assign a name to the new role.
Policies: Select all the below policies the read-only user has. Additionally, add some policies that the admin user has to achieve your needs. To save visualization you might need to give some extra permissions which capability will be more than saving visualization. Be careful about that. Also, avoid unnecessary policies for the new user like decoders_all_files. Make changes and test the user before providing it to the end-user.
Check this document for reference.
https://documentation.wazuh.com/current/user-manual/user-administration/rbac.html#mapping-with-wazuh
I hope this helps. Please let me know if you need any further information.
Regards
Md. Nazmur Sakib
Hi Khul Sat
Hope you are doing well. Sorry for the late response.
Cluster-level privileges: These privileges define the cluster-level actions users with this role are able to execute.
Indices level privileges: The owners of the role have on index level, the associated data streams and indices specified in the names argument.
Check the document to learn more:
https://www.elastic.co/guide/en/elasticsearch/reference/current/defining-roles.html
Regards
Md. Nazmur Sakib