Skip to content

Commit 1375e5c

Browse files
committed
fixup! nits
1 parent 9ecc495 commit 1375e5c

File tree

1 file changed

+14
-6
lines changed

1 file changed

+14
-6
lines changed

deploy-manage/remote-clusters/remote-clusters-api-key.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -411,10 +411,10 @@ Note that you only need to create this user on the local cluster.
411411
## Remote cluster strong verification [remote-cluster-strong-verification]
412412
preview::[]
413413

414-
Cross-cluster API keys can be configured with strong verification to provide an additional layer of security. To enable this feature,
415-
the cross-cluster API key is created with a certificate identity pattern. The local cluster is then required to be configured to sign
416-
the API key for every request to the remote cluster and provide a trusted certificate with a subject matching the certificate identity
417-
pattern that was used when the cross-cluster API key was created.
414+
Cross-cluster API keys can be configured with strong verification to provide an additional layer of security. To enable this feature,
415+
the cross-cluster API key is created with a certificate identity pattern. The local cluster is then required to sign each request
416+
to the remote cluster with its private key and provide a trusted certificate whose subject matches the certificate identity
417+
pattern configured on the cross-cluster API key.
418418

419419
### How strong verification works [_how_strong_verification_works]
420420

@@ -437,13 +437,18 @@ headers.
437437
438438
#### On the local cluster [_certificate_identity_local_cluster]
439439
440-
The local cluster must be configured to sign cross-cluster requests with a certificate-private key pair.
440+
The local cluster must be configured to sign cross-cluster requests with a certificate-private key pair. You can generate a signing
441+
certificate using `elasticsearch-certutil` or use an existing certificate.
441442
442443
```yaml
443444
cluster.remote.my_remote_cluster.signing.certificate: "path/to/signing/certificate.crt"
444445
cluster.remote.my_remote_cluster.signing.key: "path/to/signing/key.key"
445446
```
446447
448+
::::{note}
449+
Replace my_remote_cluster with your remote cluster alias and the paths with actual paths
450+
::::
451+
447452
#### On the remote cluster [_certificate_identity_remote_cluster]
448453
449454
The remote cluster must be configured with a certificate authority that trusts the certificate that was used to sign the request headers.
@@ -472,6 +477,9 @@ POST /_security/cross_cluster/api_key
472477

473478
The `certificate_identity` field supports regular expressions. For example:
474479

475-
* `"CN=.*.example.com,O=Example Corp,C=US"` matches any certificate with a CN starting with any subdomain of example.com
480+
* `"CN=.*.example.com,O=Example Corp,C=US"` matches any certificate with a CN ending in "example.com"
476481
* `"CN=local-cluster.*,O=Example Corp,C=US"` matches any certificate with a CN starting with "local-cluster"
477482
* `"CN=.*"` matches any certificate (not recommended for production)
483+
484+
To verify strong verification is active, check the Elasticsearch logs on the remote cluster for certificate validation messages, or
485+
attempt a connection without proper signing configured (which should fail with a certificate validation error).

0 commit comments

Comments
 (0)