Authorizationedit

Authorizing users to use Kibana in simple configurations is as easy as assigning the user either the kibana_user or kibana_dashboard_only_user reserved role. If you’re running a single tenant of Kibana against your Elasticsearch cluster, and you’re not controlling access to individual spaces, then this is sufficient and no other action is required.

Spacesedit

If you want to control individual spaces in Kibana, do not use the kibana_user or kibana_dashboard_only_user roles. Users with these roles are able to access all spaces in Kibana. Instead, create your own roles that grant access to specific spaces.

Multi-tenant Kibanaedit

When running multiple tenants of Kibana, and changing the kibana.index in your kibana.yml, you must create custom roles that authorize the user for that specific tenant. You can use either the Management / Security / Roles page in Kibana or the Kibana Role Management API to assign a specific Kibana privilege at that tenant. After creating the custom role, you should assign this role to the user(s) that you wish to have access.

While multi-tenant installations are supported, the recommended approach to securing access to segments of Kibana is to grant users access to specific spaces.