@@ -45,6 +45,7 @@ information, and another for viewing it.
4545* <<privileges-api-key,API key role>>: To create and manage API keys.
4646* <<privileges-agent-central-config,Central configuration management role>>: To view
4747APM Agent central configurations.
48+ * <<privileges-rum-source-mapping,RUM source mapping role>>: To read RUM source maps.
4849
4950{es-security-features} provides {ref}/built-in-roles.html[built-in roles] that grant a
5051subset of the privileges needed by APM users.
@@ -91,12 +92,10 @@ that has the following privileges:
9192|Write events into {es}
9293|====
9394
94- . If <<configuration-rum,real user monitoring>> is enabled, additional privileges are required to read source maps.
95- See {kibana-ref}/rum-sourcemap-api.html[RUM source map API] for more details.
96- Assign these extra privileges to the *general writer role*.
97- 
9895. Assign the *general writer role* to users who need to publish APM data.
9996
97+ . If <<configuration-rum,real user monitoring>> is enabled, create a separate <<privileges-rum-source-mapping,RUM source mapping role>>.
98+ 
10099//// 
101100***********************************  *********************************** 
102101***********************************  *********************************** 
@@ -354,6 +353,36 @@ which requires the following privileges:
354353TIP: Looking for privileges and roles needed to use central configuration from the {apm-app} or {apm-app} API?
355354See {kibana-ref}/apm-app-central-config-user.html[{apm-app} central configuration user].
356355
356+ [[privileges-rum-source-map]]
357+ === Grant privileges and roles needed for reading source maps
358+ 
359+ ++++ 
360+ <titleabbrev>Create a _source map_ user</titleabbrev> 
361+ ++++ 
362+ 
363+ [[privileges-rum-source-mapping]]
364+ ==== APM Server RUM source mapping
365+ 
366+ If <<configuration-rum,real user monitoring>> is enabled, additional privileges are required to read source maps.
367+ 
368+ To grant an APM Server user with the required privileges for reading RUM source maps from {es} directly without {kib},
369+ assign the user the following privileges:
370+ 
371+ [options="header"]
372+ |====
373+ |Type | Privilege | Purpose
374+ 
375+ |Index
376+ |`read` on `.apm-source-map` index
377+ |Allow {beatname_uc} to read RUM source maps from {es}
378+ |====
379+ 
380+ The above privileges should be sufficient for RUM source mapping to work properly
381+ as long as {beatname_uc} communicates with {es} successfully.
382+ If it fails, it may fallback to read source maps via {kib} if configured,
383+ which requires additional {kib} privileges.
384+ See {kibana-ref}/rum-sourcemap-api.html[RUM source map API] for more details.
385+ 
357386//// 
358387***********************************  *********************************** 
359388***********************************  *********************************** 
0 commit comments