You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -332,4 +332,8 @@ For more information about these settings, see [Active Directory realm settings]
332
332
333
333
::::{note}
334
334
By default, when you configure {{es}} to connect to Active Directory using SSL/TLS, it attempts to verify the hostname or IP address specified with the `url` attribute in the realm configuration with the values in the certificate. If the values in the certificate and realm configuration do not match, {{es}} does not allow a connection to the Active Directory server. This is done to protect against man-in-the-middle attacks. If necessary, you can disable this behavior by setting the `ssl.verification_mode` property to `certificate`.
335
-
::::
335
+
::::
336
+
337
+
### Using {{kib}} with Active Directory [ad-realm-kibana]
338
+
339
+
The Active Directory security realm uses the {{kib}}-provided [basic authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication#basic-authentication) login form. Basic authentication is enabled by default.
Copy file name to clipboardExpand all lines: deploy-manage/users-roles/cluster-or-deployment-auth/kerberos.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -202,21 +202,25 @@ For detailed information of available realm settings, see [Kerberos realm settin
202
202
You should use these exact filenames for {{ecloud}} to recognize the file in the bundle.
203
203
::::
204
204
205
-
2. Edit your cluster configuration, sometimes also referred to as the deployment plan, to define Kerberos settings as described in [Elasticsearch documentation](/deploy-manage/users-roles/cluster-or-deployment-auth/kerberos.md).
205
+
2. Edit your cluster configuration, sometimes also referred to as the deployment plan, to define your Kerberos settings:
206
206
207
207
```sh
208
208
xpack.security.authc.realms.kerberos.cloud-krb:
209
209
order: 2
210
210
keytab.path: es.keytab
211
211
remove_realm_name: false
212
212
```
213
+
214
+
::::{important}
215
+
The name of the realm must be `cloud-krb`, and the order must be 2: `xpack.security.authc.realms.kerberos.cloud-krb.order: 2`
216
+
::::
213
217
::::
214
218
215
219
::::{tab-item} ECK
216
220
217
221
1. Install your `krb5.conf` and `keytab` files as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md).
218
222
219
-
2. Edit your cluster configuration, sometimes also referred to as the deployment plan, to define Kerberos settings as described in [Elasticsearch documentation](/deploy-manage/users-roles/cluster-or-deployment-auth/kerberos.md).
223
+
2. Edit your cluster configurationto define your Kerberos settings:
220
224
221
225
```sh
222
226
xpack.security.authc.realms.kerberos.cloud-krb:
@@ -258,7 +262,7 @@ POST /_security/role_mapping/kerbrolemapping
258
262
In case you want to support Kerberos cross realm authentication, you may need to map roles based on the Kerberos realm name. For such scenarios, the following additional user metadata can be used for role mapping:
259
263
260
264
- `kerberos_realm`: The Kerberos realm name.
261
-
- `kerberos_user_principal_name`The user principal name from the Kerberos ticket.
265
+
- `kerberos_user_principal_name`:The user principal name from the Kerberos ticket.
262
266
263
267
For more information, see [Mapping users and groups to roles](/deploy-manage/users-roles/cluster-or-deployment-auth/mapping-users-groups-to-roles.md).
264
268
@@ -268,4 +272,4 @@ The Kerberos realm supports [authorization realms](/deploy-manage/users-roles/cl
268
272
269
273
### Configure Kibana for Kerberos [kerberos-realm-kibana]
270
274
271
-
If you want to use Kerberos to authenticate using your browser and {{kib}}, you need to enable the relevant authentication provider in {{kib}} configuration. See [kerberos single sign-on](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication.md#kerberos)
275
+
If you want to use Kerberos to authenticate using your browser and {{kib}}, you need to enable the relevant authentication provider in {{kib}} configuration. See [Kerberos single sign-on](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication.md#kerberos)
Copy file name to clipboardExpand all lines: deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -331,4 +331,10 @@ For more information about these settings, see [LDAP realm settings](https://www
331
331
332
332
::::{note}
333
333
By default, when you configure {{es}} to connect to an LDAP server using SSL/TLS, it attempts to verify the hostname or IP address specified with the `url` attribute in the realm configuration with the values in the certificate. If the values in the certificate and realm configuration do not match, {{es}} does not allow a connection to the LDAP server. This is done to protect against man-in-the-middle attacks. If necessary, you can disable this behavior by setting the `ssl.verification_mode` property to `certificate`.
334
-
::::
334
+
::::
335
+
336
+
### Using {{kib}} with LDAP [ldap-realm-kibana]
337
+
338
+
The LDAP security realm uses the {{kib}}-provided [basic authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication#basic-authentication) login form. Basic authentication is enabled by default.
339
+
340
+
You can also use LDAP with [token authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication#token-authentication) in Kibana.
0 commit comments