Skip to content

Commit 19dd9c4

Browse files
committed
cleanup
1 parent 9d4cf2f commit 19dd9c4

File tree

3 files changed

+20
-6
lines changed

3 files changed

+20
-6
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -332,4 +332,8 @@ For more information about these settings, see [Active Directory realm settings]
332332

333333
::::{note}
334334
By default, when you configure {{es}} to connect to Active Directory using SSL/TLS, it attempts to verify the hostname or IP address specified with the `url` attribute in the realm configuration with the values in the certificate. If the values in the certificate and realm configuration do not match, {{es}} does not allow a connection to the Active Directory server. This is done to protect against man-in-the-middle attacks. If necessary, you can disable this behavior by setting the `ssl.verification_mode` property to `certificate`.
335-
::::
335+
::::
336+
337+
### Using {{kib}} with Active Directory [ad-realm-kibana]
338+
339+
The Active Directory security realm uses the {{kib}}-provided [basic authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication#basic-authentication) login form. Basic authentication is enabled by default.

deploy-manage/users-roles/cluster-or-deployment-auth/kerberos.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -202,21 +202,25 @@ For detailed information of available realm settings, see [Kerberos realm settin
202202
You should use these exact filenames for {{ecloud}} to recognize the file in the bundle.
203203
::::
204204

205-
2. Edit your cluster configuration, sometimes also referred to as the deployment plan, to define Kerberos settings as described in [Elasticsearch documentation](/deploy-manage/users-roles/cluster-or-deployment-auth/kerberos.md).
205+
2. Edit your cluster configuration, sometimes also referred to as the deployment plan, to define your Kerberos settings:
206206

207207
```sh
208208
xpack.security.authc.realms.kerberos.cloud-krb:
209209
order: 2
210210
keytab.path: es.keytab
211211
remove_realm_name: false
212212
```
213+
214+
::::{important}
215+
The name of the realm must be `cloud-krb`, and the order must be 2: `xpack.security.authc.realms.kerberos.cloud-krb.order: 2`
216+
::::
213217
::::
214218

215219
::::{tab-item} ECK
216220

217221
1. Install your `krb5.conf` and `keytab` files as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md).
218222

219-
2. Edit your cluster configuration, sometimes also referred to as the deployment plan, to define Kerberos settings as described in [Elasticsearch documentation](/deploy-manage/users-roles/cluster-or-deployment-auth/kerberos.md).
223+
2. Edit your cluster configuration to define your Kerberos settings:
220224

221225
```sh
222226
xpack.security.authc.realms.kerberos.cloud-krb:
@@ -258,7 +262,7 @@ POST /_security/role_mapping/kerbrolemapping
258262
In case you want to support Kerberos cross realm authentication, you may need to map roles based on the Kerberos realm name. For such scenarios, the following additional user metadata can be used for role mapping:
259263

260264
- `kerberos_realm`: The Kerberos realm name.
261-
- `kerberos_user_principal_name` The user principal name from the Kerberos ticket.
265+
- `kerberos_user_principal_name`: The user principal name from the Kerberos ticket.
262266

263267
For more information, see [Mapping users and groups to roles](/deploy-manage/users-roles/cluster-or-deployment-auth/mapping-users-groups-to-roles.md).
264268

@@ -268,4 +272,4 @@ The Kerberos realm supports [authorization realms](/deploy-manage/users-roles/cl
268272

269273
### Configure Kibana for Kerberos [kerberos-realm-kibana]
270274

271-
If you want to use Kerberos to authenticate using your browser and {{kib}}, you need to enable the relevant authentication provider in {{kib}} configuration. See [kerberos single sign-on](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication.md#kerberos)
275+
If you want to use Kerberos to authenticate using your browser and {{kib}}, you need to enable the relevant authentication provider in {{kib}} configuration. See [Kerberos single sign-on](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication.md#kerberos)

deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -331,4 +331,10 @@ For more information about these settings, see [LDAP realm settings](https://www
331331

332332
::::{note}
333333
By default, when you configure {{es}} to connect to an LDAP server using SSL/TLS, it attempts to verify the hostname or IP address specified with the `url` attribute in the realm configuration with the values in the certificate. If the values in the certificate and realm configuration do not match, {{es}} does not allow a connection to the LDAP server. This is done to protect against man-in-the-middle attacks. If necessary, you can disable this behavior by setting the `ssl.verification_mode` property to `certificate`.
334-
::::
334+
::::
335+
336+
### Using {{kib}} with LDAP [ldap-realm-kibana]
337+
338+
The LDAP security realm uses the {{kib}}-provided [basic authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication#basic-authentication) login form. Basic authentication is enabled by default.
339+
340+
You can also use LDAP with [token authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication#token-authentication) in Kibana.

0 commit comments

Comments
 (0)