A solid, open source Elasticsearch security solution.




 

🛑 important:  in version 6.3.x  (or greater) you need to disable X-Pack's Security Module from both elasticsearch.yml and kibana.yml.

 


What's new in
  • 🚀New Support for Elasticsearch & Kibana 7.0.1
  • 🧐Enhancement (Elasticsearch) empty array values in settings are invalid
  • 🐞Security Fix (Elasticsearch) arbitrary x-cluster search referencing local cluster
  • 🐞Fix (Elasticsearch) ArrayOutOfBoundException on snapshot operations
  • 🧐Enhancement (PRO/Enterprise) History cleaning can now be disabled ("clearSessionOnEvents")

What's new in 1.17.7
  • 🚀New Support for Elasticsearch 7.0.0 (Kibana is coming soon)
  • 🧐Enhancement (Elasticsearch) rewritten LDAP connector
  • 🧐Enhancement (Elasticsearch) new core written in Scala is now GA
  • 🐞Fix (Enterprise) devtools requests now honor the currently selected tenancy
  • 🐞Security Fix (Enterprise/PRO) Fix "connectorsService" error in installation

What's new in 1.17.5
  • 🚀New Support for Kibana/Elasticsearch 6.7.1
  • 🧐Enhancement (Enterprise >= Kibana 6.6.0) Multiple SAML identity provider
  • 🐞Security Fix (Enterprise/PRO) Don't pass auth headers back to the browser
  • 🐞Fix (Enterprise/PRO) Missing null check caused error in reporting (CSV)
  • 🐞Fix (Enterprise) Don't reject requests if SAML groups are not configured
  • 🐞Fix filter/fields rules not working in msearch (in 6.7.x)
  • 🧐Enhancement Print whole LDAP search query in debug log

What's new in 1.17.4
  • 🚀New Support for Kibana/Elasticsearch 6.7.0
  • 🧐Enhancement (PRO/Enterprise) JWT query param is the preferred credentials provider
  • 🧐Enhancement (PRO/Enterprise) admin users can use indices management
  • 🧐Enhancement (PRO/Enterprise) ro users can dismiss telemetry form
  • 🐞Fix Audit logging in 5.1.x now works again
  • 🐞Fix unpredictable behaviour of "filter" and "fields" when using external auth
  • 🐞Fix LDAP ConcurrentModificationException
  • 🐞Fix Audit logging in 5.1.x now works again
  • 🐞Fix (PRO/Enterprise) JWT deep-link works again


What's new in 1.17.3

1.17.2 went unreleased, all changes have been merged in 1.17.3 directly

  • 🐞Fix (Enterprise) Tenancy selector showing if user belonged to one group
  • 🐞Fix (PRO/Enterprise) RW buttons not hiding for RO users in React Kibana apps
  • 🐞Fix (Enterprise) Tenancy templating now works much more reliably
  • 🐞Fix (Enterprise) Missing tenancy selector icon after switching tenancy
  • 🐞Fix (PRO/Enterprise) barring static files requests caused sudden logout
  • 🐞Fix Numerous fixes to better support Kibana 6.6.x
  • 🐞Fix Critical fixes in new Scala core
  • 🐞Fix Exception in reindex requests caused tenancy templating to fail
  • 🧐Enhancement Bypass cross-cluster search logic if single cluster

What's new in 1.17.1
  • 🐞Fix (PRO/Enterprise) SAML now works well in 6.6.x
  • 🐞Fix (PRO/Enterprise) "undefined" authentication error before login
  • 🐞Fix (Enterprise) Default space creation failures for new tenants
  • 🐞Fix (Enterprise) Icons/titles CSS misalignment in sidebar (Firefox)
  • 🧐Enhancement(Enterprise) UX: Larger tenancy selector
  • 🐞Security Fix (Enterprise) Privilege escalation when changing tenancies under monitoring
  • 🐞Fix (Elasticsearch) compatibility fixes to support new Kibana features
  • 🧐Enhancements (Elasticsearch) New core and LDAP connector written in Scala is finished, now under QA.

What's new in 1.17.0
  • 🚀New Feature Support for Kibana/Elasticsearch 6.6.0, 6.6.1
  • 🚀New Feature Internode SSL (ES 6.3.x onwards)
  • 🧐Enhancement(PRO/Enterprise) UI appearence
  • 🧐Enhancement Made HTTP Connection configurable (PR #410)
  • 🐞Fix slow boot due to SecureRandom waiting for sufficient entropy
  • 🐞Fix Enable kibana_access:ro to create short urls in es6.3+ (PR #408)

What's new in 1.16.34
  • 🧐Enhancement X-Forwarded-For header in printed es logs ("XFF")
  • 🧐Enhancement kibana_index: "[email protected]{user}" when user is "John Doe" becomes .kibana_john_doe
  • 🐞Fix (Enteprise) parse SAML groups from assertion as array of strings
  • 🐞Fix (Enteprise) SAMLRequest in location header was URLEncoded twice, broke on some IdP
  • 🐞Fix (PRO/Enteprise) "cookiePass" works again, no more need for sticky cookies in load balancers!
  • 🐞Fix (PRO/Enteprise) fix redirect loop with JWT deep linking when JWT token expires
  • 🧐Enhancement (PRO/Enteprise) fix audit demo page CSS
  • 🧐Enhancement (Enteprise) SAML more configuration parameters available
  • 🚀New Feature (PRO/Enteprise) set ROR to debug mode (readonlyrest_kbn.logLevel: "debug")

What's new in 1.16.33
  • 🐞Fix(PRO/Enteprise) compatibility problems with older Kibana versions
  • 🐞Fix(PRO/Enteprise) compatibility problems with OSS Kibana version

What's new in 1.16.32
  • 🚀New Feature "kibanaIndexTemplate": default dashboards and spaces for new tenants
  • 🧐Enhancement Support for ES/Kibana 6.5.4
  • 🧐Enhancement Upgraded LDAP library
  • 🧐Enhancement (Enterprise) Now tenants save their CSV exports in their own reporting index
  • 🐞Fix(PRO/Enteprise) Support passwords that start and/or end with spaces
  • 🐞Fix (PRO/Enterprise) Now reporting works again

What's new in 1.16.31
  • 🧐Enhancement Support for ES/Kibana 6.5.2, 6.5.3
  • 🚧WIP: Laid out the foundation for LDAP HA support

What's new in 1.16.29
  • 🧐Enhancement Support for ES/Kibana 6.4.3
  • 🚀New Feature (PRO/Enterprise) configurable server side session duration
  • 🚀New Feature [LDAP] High Availability: Round Robin or Failover

What's new in 1.16.28
  • 🧐Enhancement Support for ES/Kibana 6.4.2
  • 🐞Fix (Enterprise) Multi tenancy: sometimes changing tenancy would not change kibana index
  • 🐞Security Fix (Enterprise/PRO) Avoid echoing Base64 encoded credentials in login form error message
  • 🧐Enhancement (Enterprise/PRO) Remove latest search/visualization/dashboard history on logout
  • 🧐Enhancement (Enterprise/PRO) Clear transient authentication cookies on login error to avoid authentication deadlocks
  • 🐞Fix: External JWT verification may throw ArrayOutOfBoundException
  • 🚧WIP: Laid out the foundation for internode SSL transport (port 9300)

What's new in 1.16.27
  • 🚀New Feature [JWT] external validator: it's now possible to avoid storing the private key in settings
  • 🧐Enhancement Support for ES/Kibana 6.4.1
  • 🧐Enhancement Rewritten big part of ES plugin documentation
  • 🧐Enhancement SAML Single log out flow
  • 🐞Fix (Enterprise/PRO) cookiePass works again, but only for Kibana 5.x. Newer Kibana needs sticky sessions in LB.
  • 🧐Enhancement (Enterprise/PRO) much faster logout

What's new in 1.16.26
  • 🐞 Fix (PRO/Enterprise) bugs during plugin packaging and installation process

What's new in 1.16.25
  • 🚀New Feature Users rule: easily restrict external authentication to a list of users
  • 🧐Enhancement Support for ES 5.6.11
  • 🐞Hot Fix (Enterprise/PRO) Error 404 when logging in with older versions of Kibana

What's new in 1.16.24
  • 🚀New Feature (Enterprise) SAML Authentication
  • 🚀New Feature Support for Elasticsearch and Kibana 6.4.0
  • 🚀New Feature Headers rule now split in headers_or and headers_and
  • 🧐Enhancement Headers rule now allows wildcards
  • 🚀New Feature (Enterprise) Multi-tenancy now works also with JSON groups provider
  • 🐞 Fix Multi-tenancy (Enterprise) incoherent initial kibana_index and current group

What's new in 1.16.23
  • 🧐Enhancement Support for Elastic Stack 6.3.1 and 5.6.10
  • 🚀New Feature (Enterprise) Custom CSS injection for Kibana
  • 🚀New Feature (Enterprise) Custom Javascript injection for Kibana
  • 🚀New Feature (PRO/Enterprise) access paths without need to login (i.e. /api/status)
  • 🐞Fix (PRO/Enterprise) Navigating to X-Pack APM caused hidden Kibana apps to reappear

What's new in 1.16.22
  • 🚀New Feature:  map LDAP groups to local groups (a.k.a. role mapping)
  • 🐞 Fix (Elasticsearch) wildcard aliases resolution not working in "indices" rule.
  • 🧐Enhancement: it is now possible now to use JDK 9 and 10
  • 🐞 Fix (PRO/Enterprise) wait forever for login request (i.e.  slow LDAP servers)
  • 🐞 Fix (PRO/Enterprise) add spinner and block UI if login request is being sent
  • 🐞 Fix (PRO/Enterprise) if user is logged out because of LDAP cache expiring + slow authentication, redirect to login.
  • 🐞 Fix (PRO/Enterprise) let RO users delete/edit search filters

What's new in 1.16.21
  • 🚀New Feature: Introducing support for Elasticsearch and Kibana v6.3.0
  • 🐞 Fix (Enterprise) multi tenancy - switching tenancy does not always switch kibana index

 

What's new in 1.16.20

ReadonlyREST PRO/Enterprise for Kibana

  • 🧐 Enhancement: when login, forward "elasticsearch.requestHeadersWhitelist" headers. (useful for "headers" rule  and "proxy_auth" to work well.)

ReadonlyREST for Elasticsearch

  • 🚀New Feature: DLS (with dynamic variables suppoort) Thanks DataSweet!
  • 🚀 New feature: Field level security
  • 🚀 New rules: Snapshot, Repositories, Headers
  • 🧐 Enhancement: custom audit serializers: the request content is available
  • 🐞 Fix readonlyrest.yml path discovery
  • 🐞 Fix: LDAP available groups discovery (tenancy switcher) corner cases
  • 🐞 Fix: auth_key_sha1, auth_key_sha256 hashes in settings should be case insensitive
  • 🐞 Fix: LDAP authentication didn't work with local group

Get it NOW

 

Questions, comments, & concerns?[email protected]

Create A product first!

Create a product first please!