@@ -411,10 +411,10 @@ Note that you only need to create this user on the local cluster.
411411# # Remote cluster strong verification [remote-cluster-strong-verification]
412412preview::[]
413413
414- Cross-cluster API keys can be configured with strong verification to provide an additional layer of security. To enable this feature,
415- the cross-cluster API key is created with a certificate identity pattern. The local cluster is then required to be configured to sign
416- the API key for every request to the remote cluster and provide a trusted certificate with a subject matching the certificate identity
417- pattern that was used when the cross-cluster API key was created.
414+ Cross-cluster API keys can be configured with strong verification to provide an additional layer of security. To enable this feature,
415+ the cross-cluster API key is created with a certificate identity pattern. The local cluster is then required to sign each request
416+ to the remote cluster with its private key and provide a trusted certificate whose subject matches the certificate identity
417+ pattern configured on the cross-cluster API key.
418418
419419# ## How strong verification works [_how_strong_verification_works]
420420
@@ -437,13 +437,18 @@ headers.
437437
438438#### On the local cluster [_certificate_identity_local_cluster]
439439
440- The local cluster must be configured to sign cross-cluster requests with a certificate-private key pair.
440+ The local cluster must be configured to sign cross-cluster requests with a certificate-private key pair. You can generate a signing
441+ certificate using `elasticsearch-certutil` or use an existing certificate.
441442
442443```yaml
443444cluster.remote.my_remote_cluster.signing.certificate: "path/to/signing/certificate.crt"
444445cluster.remote.my_remote_cluster.signing.key: "path/to/signing/key.key"
445446```
446447
448+ ::::{note}
449+ Replace my_remote_cluster with your remote cluster alias and the paths with actual paths
450+ ::::
451+
447452#### On the remote cluster [_certificate_identity_remote_cluster]
448453
449454The remote cluster must be configured with a certificate authority that trusts the certificate that was used to sign the request headers.
@@ -472,6 +477,9 @@ POST /_security/cross_cluster/api_key
472477
473478The ` certificate_identity` field supports regular expressions. For example:
474479
475- * ` " CN=.*.example.com,O=Example Corp,C=US" ` matches any certificate with a CN starting with any subdomain of example.com
480+ * ` " CN=.*.example.com,O=Example Corp,C=US" ` matches any certificate with a CN ending in " example.com"
476481* ` " CN=local-cluster.*,O=Example Corp,C=US" ` matches any certificate with a CN starting with " local-cluster"
477482* ` " CN=.*" ` matches any certificate (not recommended for production)
483+
484+ To verify strong verification is active, check the Elasticsearch logs on the remote cluster for certificate validation messages, or
485+ attempt a connection without proper signing configured (which should fail with a certificate validation error).
0 commit comments