Enabling anonymous access
Enabling anonymous access
To embed Kibana dashboards or grant access to Kibana without requiring credentials, use Kibana’s anonymous authentication feature instead.
Incoming requests are considered to be anonymous if no authentication token can be extracted from the incoming request. By default, anonymous requests are rejected and an authentication error is returned (status code 401
).
To enable anonymous access, you assign one or more roles to anonymous users in the elasticsearch.yml
configuration file. For example, the following configuration assigns anonymous users role1
and role2
:
xpack.security.authc:
anonymous:
username: anonymous_user
roles: role1, role2
authz_exception: true
The username/principal of the anonymous user. Defaults to | |
The roles to associate with the anonymous user. If no roles are specified, anonymous access is disabled—anonymous requests will be rejected and return an authentication error. | |
When |