Skip to content

Commit 3258cd1

Browse files
fix minor issues in cluster auth docs (#2478)
1 parent 47dbf6a commit 3258cd1

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/external-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ External authentication in Elastic is any form of authentication that requires i
1313

1414
Elastic offers several external [realm](authentication-realms.md) types, each of which represents a common authentication provider. You can have as many external realms as you would like, each with its own unique name and configuration.
1515

16-
If the authentication provider that you want to use is not currently supported, then you can create a your own [custom realm plugin](custom.md) to integrate with additional systems.
16+
If the authentication provider that you want to use is not currently supported, then you can create your own [custom realm plugin](custom.md) to integrate with additional systems.
1717

1818
In this section, you'll learn how to configure different types of external realms, and use them to grant access to Elastic resources.
1919

deploy-manage/users-roles/cluster-or-deployment-auth/jwt.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -284,7 +284,7 @@ You can relax validation of any of the time-based claims by setting `allowed_clo
284284

285285
## Role mapping [jwt-authorization]
286286

287-
You can map LDAP groups to roles in the following ways:
287+
You can map JWT groups to roles in the following ways:
288288

289289
* Using the role mappings page in {{kib}}.
290290
* Using the [role mapping API](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-put-role-mapping).

deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The path to an entry is a *Distinguished Name* (DN) that uniquely identifies a u
3838
The `ldap` realm supports two modes of operation, a user search mode and a mode with specific templates for user DNs.
3939

4040
::::{important}
41-
When you configure realms in `elasticsearch.yml`/deploy-manage/stack-settings.md, only the realms you specify are used for authentication. If you also want to use the `native` or `file` realms, you must include them in the realm chain.
41+
When you configure realms in [`elasticsearch.yml`](/deploy-manage/stack-settings.md), only the realms you specify are used for authentication. If you also want to use the `native` or `file` realms, you must include them in the realm chain.
4242
::::
4343

4444
## Step 1: Add a new realm configuration [ldap-realm-configuration]

0 commit comments

Comments
 (0)