diff --git a/_security-plugin/access-control/users-roles.md b/_security-plugin/access-control/users-roles.md index 9059a1f8..003bf4d6 100644 --- a/_security-plugin/access-control/users-roles.md +++ b/_security-plugin/access-control/users-roles.md @@ -111,8 +111,8 @@ Role | Description `all_access` | Grants full access to the cluster: all cluster-wide operations, write to all indices, write to all tenants. `cross_cluster_replication_follower_full_access` | Grants full access to perform cross-cluster replication actions on the follower cluster. `cross_cluster_replication_leader_full_access` | Grants full access to perform cross-cluster replication actions on the leader cluster. -`kibana_read_only` | A special role that prevents users from making changes to visualizations, dashboards, and other OpenSearch Dashboards objects. See `opensearch_security.readonly_mode.roles` in `opensearch_dashboards.yml`. Pair with the `kibana_user` role. -`kibana_user` | Grants permissions to use OpenSearch Dashboards: cluster-wide searches, index monitoring, and write to various OpenSearch Dashboards indices. +`opensearch_dashboards_read_only` | A special role that prevents users from making changes to visualizations, dashboards, and other OpenSearch Dashboards objects. See `opensearch_security.readonly_mode.roles` in `opensearch_dashboards.yml`. Pair with the `opensearch_dashboards_user` role. +`opensearch_dashboards_user` | Grants permissions to use OpenSearch Dashboards: cluster-wide searches, index monitoring, and write to various OpenSearch Dashboards indices. `logstash` | Grants permissions for Logstash to interact with the cluster: cluster-wide searches, cluster monitoring, and write to the various Logstash indices. `manage_snapshots` | Grants permissions to manage snapshot repositories, take snapshots, and restore snapshots. `readall` | Grants permissions for cluster-wide searches like `msearch` and search permissions for all indices. @@ -151,7 +151,7 @@ Map three roles to the read-only user: 1. Choose the **Mapped users** tab and **Manage mapping**. 1. For **Internal users**, add your read-only user. 1. Choose **Map**. -1. Repeat these steps for the `kibana_user` and `kibana_read_only` roles. +1. Repeat these steps for the `opensearch_dashboards_user` and `opensearch_dashboards_read_only` roles. ### Set up a bulk access role in OpenSearch Dashboards