Skip to content

Commit 5654a2c

Browse files
committed
oidc
1 parent 049d66b commit 5654a2c

File tree

10 files changed

+511
-1238
lines changed

10 files changed

+511
-1238
lines changed

deploy-manage/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -627,6 +627,8 @@ toc:
627627
- file: users-roles/cluster-or-deployment-auth/kerberos.md
628628
- file: users-roles/cluster-or-deployment-auth/ldap.md
629629
- file: users-roles/cluster-or-deployment-auth/openid-connect.md
630+
children:
631+
- file: users-roles/cluster-or-deployment-auth/oidc-examples.md
630632
- file: users-roles/cluster-or-deployment-auth/saml.md
631633
- file: users-roles/cluster-or-deployment-auth/pki.md
632634
- file: users-roles/cluster-or-deployment-auth/custom.md

deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ Because users are managed externally in the Active Directory server, the expecta
170170

171171
The `active_directory` realm enables you to map Active Directory users to roles using their Active Directory groups or other metadata.
172172

173-
You can map Active Directory groups to roles for your users in multiple ways:
173+
You can map Active Directory groups to roles for your users in the following ways:
174174

175175
* Using the role mappings page in {{kib}}.
176176
* Using the [role mapping API](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-put-role-mapping).

deploy-manage/users-roles/cluster-or-deployment-auth/jwt.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -284,7 +284,7 @@ You can map LDAP groups to roles in the following ways:
284284

285285
* Using the role mappings page in {{kib}}.
286286
* Using the [role mapping API](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-put-role-mapping).
287-
* Delegating authorization to another realm.
287+
* By delegating authorization [to another realm](#jwt-authorization-delegation).
288288

289289
For more information, see [Mapping users and groups to roles](/deploy-manage/users-roles/cluster-or-deployment-auth/mapping-users-groups-to-roles.md).
290290

deploy-manage/users-roles/cluster-or-deployment-auth/oidc-examples.md

Lines changed: 373 additions & 0 deletions
Large diffs are not rendered by default.

deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md

Lines changed: 134 additions & 112 deletions
Large diffs are not rendered by default.

raw-migrated-files/cloud/cloud/ec-secure-clusters-oidc.md

Lines changed: 0 additions & 235 deletions
This file was deleted.

raw-migrated-files/cloud/cloud/ec-securing-clusters-oidc-op.md

Lines changed: 0 additions & 416 deletions
This file was deleted.

raw-migrated-files/elasticsearch/elasticsearch-reference/oidc-guide.md

Lines changed: 0 additions & 462 deletions
This file was deleted.

raw-migrated-files/elasticsearch/elasticsearch-reference/oidc-realm.md

Lines changed: 0 additions & 10 deletions
This file was deleted.

raw-migrated-files/toc.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,6 @@ toc:
162162
- file: cloud/cloud/ec-restoring-snapshots.md
163163
- file: cloud/cloud/ec-saas-metrics-accessing.md
164164
- file: cloud/cloud/ec-secure-clusters-oidc.md
165-
- file: cloud/cloud/ec-securing-clusters-oidc-op.md
166165
- file: cloud/cloud/ec-securing-clusters-saml-azure.md
167166
- file: cloud/cloud/ec-securing-clusters-SAML.md
168167
- file: cloud/cloud/ec-security.md

0 commit comments

Comments
 (0)