Open pborgonovi opened 2 months ago
Pinging @elastic/security-detection-engine (Team:Detection Engine)
Pinging @elastic/security-solution (Team: SecuritySolution)
Thanks for finding this. I'm going to tag response ops as I believe they own the component that displays all of the connectors.
Pinging @elastic/response-ops (Team:ResponseOps)
Pinging @elastic/security-detections-response (Team:Detections and Resp)
Hey! Yes, the ResponseOps own this component and it is also happening on the stack management page. Ideally, we should not show the system actions to which the user does not have access. I put it in our backlog.
Describe the bug: An user without Cases privilegies can still see System Action option available under Actions section and is thrown an error if tries to save a rule using it
Kibana/Elasticsearch Stack version: 8.16 SNAPSHOT
Server OS version:
Browser and Browser OS versions:
Elastic Endpoint version:
Original install method (e.g. download page, yum, from source, etc.):
Functional Area (e.g. Endpoint management, timelines, resolver, etc.):
Steps to reproduce:
Current behavior: User is still able to select Cases and is thrown an error when trying to save the rule
Expected behavior: User should not be able to select Cases as an action
Screenshots (if relevant):
https://github.com/user-attachments/assets/c9d02a9f-1dbb-4c4b-a613-805de0d8796a
Errors in browser console (if relevant):
Provide logs and/or server output (if relevant):
Any additional context (logs, chat logs, magical formulas, etc.):