Configuring security for data imports

The following permissions are required to operate on Siren-managed indices, which you can configure on the ACL tab of the Access control app:

Action on entity table Permission required

Add, rename field

Change permission on entity table object.

Delete field

Delete permission on entity table object.

Import data

Import permission on entity table object.

Delete data, index, entity table object

Delete permission on entity table object.

Granting index permissions

If the entity table is based on a standard (not Siren-managed) Elasticsearch index then it requires explicit index-level permissions to read and write records as well permission to refresh the target index with the maintenance permission.

The following is an example of an investigate_system role definition for Elastic Stack Security that gives the backend user the required permissions on the article index:

{
  "cluster": [
    "cluster:internal/federate/*",
    "cluster:admin/federate/*",
    "cluster:monitor/*",
    "manage_index_templates"
  ],
  "indices": [
    {
      "names": [
        "article"
      ],
      "privileges": [
        "read",
        "write",
        "maintenance"
      ]
    }
  ]
}

The following is an analogous investigate_system role definition for Search Guard Classic:

investigate_system:
  cluster_permissions:
  - CLUSTER_COMPOSITE_OPS
  - CLUSTER_MANAGE
  - CLUSTER_MONITOR
  index_permissions:
  # Grant the backend user permission to read and write records and to perform an index refresh on every standard ES index for which you want to enable data imports.
  - index_patterns:
    - 'article'
    allowed_actions:
    - READ
    - WRITE
    - 'indices:admin/refresh*'