We use JWT tokens for auth, but here is result of authinfo query using a valid token:
{
âuserâ : âUser [name=36b46947-e27f-4423-9d82-98c1fc0cc660, backend_roles=, requestedTenant=null]â,
âuser_nameâ : â36b46947-e27f-4423-9d82-98c1fc0cc660â,
âuser_requested_tenantâ : null,
âremote_addressâ : â10.14.250.35:52513â,
âbackend_rolesâ : ,
âcustom_attribute_namesâ : [
âattr.jwt.issâ,
âattr.jwt.session_stateâ,
âattr.jwt.typâ,
âattr.jwt.auth_timeâ,
âattr.jwt.email_verifiedâ,
âattr.jwt.preferred_usernameâ,
âattr.jwt.given_nameâ,
âattr.jwt.audâ,
âattr.jwt.acrâ,
âattr.jwt.nbfâ,
âattr.jwt.resource_accessâ,
âattr.jwt.ki-realm-rolesâ,
âattr.jwt.realm_accessâ,
âattr.jwt.azpâ,
âattr.jwt.family_nameâ,
âattr.jwt.scopeâ,
âattr.jwt.subâ,
âattr.jwt.nameâ,
âattr.jwt.expâ,
âattr.jwt.iatâ,
âattr.jwt.jtiâ,
âattr.jwt.emailâ
],
âsg_rolesâ : [
âSGS_OWN_INDEXâ,
âuser-roles-36b46947-e27f-4423-9d82-98c1fc0cc660â
],
âsg_tenantsâ : {
â36b46947-e27f-4423-9d82-98c1fc0cc660â : true
},
âprincipalâ : null,
âpeer_certificatesâ : â0â,
âsso_logout_urlâ : null
}
The error from the elastic log:
[2019-10-17T11:05:54,412][INFO ][c.f.s.p.PrivilegesEvaluator] [ktelastic] No cluster-level perm match for User [name=36b46947-e27f-4423-9d82-98c1fc0cc660, backend_roles=, requestedTenant=null] Resolved [aliases=[], indices=[], allIndices=[], types=[], originalRequested=, remoteIndices=] [Action [indices:data/read/scroll/clear]] [RolesChecked [user-roles-36b46947-e27f-4423-9d82-98c1fc0cc660, SGS_OWN_INDEX]]
[2019-10-17T11:05:54,412][INFO ][c.f.s.p.PrivilegesEvaluator] [ktelastic] No permissions for [indices:data/read/scroll/clear]
The roles checked have an action group called âINDICES_ALLâ:
{
âuser-roles-36b46947-e27f-4423-9d82-98c1fc0cc660â : {
âreservedâ : false,
âhiddenâ : false,
âcluster_permissionsâ : [
âCLUSTER_COMPOSITE_OPSâ
],
âindex_permissionsâ : [
{
âindex_patternsâ : [
âd20e21af9d20-006e15f6efc3â
],
âflsâ : ,
âmasked_fieldsâ : ,
âallowed_actionsâ : [
âINDICES_ALLâ,
âSGS_INDICES_ALLâ
]
},
{
âindex_patternsâ : [
â51b5672da2b2-1f2d0781ef09â
],
âflsâ : ,
âmasked_fieldsâ : ,
âallowed_actionsâ : [
âINDICES_ALLâ
]
}
],
âtenant_permissionsâ : ,
âstaticâ : false
}
}
Action group âINDICES_ALLâ includes SGS_INDICES_ALL (I also manually added indices:data/read/scroll/* just to be safe, but it makes no difference as expected).
{
âINDICES_ALLâ : {
âreservedâ : false,
âhiddenâ : false,
âallowed_actionsâ : [
âindices:data/read/scrollâ,
âindices:data/read/scroll/clearâ,
âSGS_INDICES_ALLâ
],
âtypeâ : âindexâ,
âstaticâ : false
}
}