My testuser mapped to this role is still able to read all existing actions and even delete them all. Which permissions I need to configure to prevent my test user from doing that?
I have removed it and now my testuser is not able to see any action. Is there more granular way of controling the permissions here for example: show only those signals created by the user, or only signals for which index pattern the user has access to and similar configurations? Thanks
these are based on access level, as opposed to visibility. Meaning the user will still be able to view all.
The workaround would be to use tenants to segregate different watchers on separate tenants that the user either has access to or not.
Also important to note, the signals run with the same security privilege as the last user that updated the job. therefore if signal was created by user A, the job will run with permissions assigned to user A, however if user B later amends the signal, the job will now run with user B’s permissions.