Skip to content

Commit 73b5ca7

Browse files
committed
more
1 parent 60c7593 commit 73b5ca7

File tree

3 files changed

+2
-198
lines changed

3 files changed

+2
-198
lines changed

deploy-manage/security/limitations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Multi get and multi term vectors API throw IndexNotFoundException when trying to
2525

2626
## Filtered index aliases [_filtered_index_aliases]
2727

28-
Aliases containing filters are not a secure way to restrict access to individual documents, due to the limitations described in [Index and field names can be leaked when using aliases](../../../deploy-manage/security.md#alias-limitations). The {{stack-security-features}} provide a secure way to restrict access to documents through the [document-level security](../../../deploy-manage/users-roles/cluster-or-deployment-auth/controlling-access-at-document-field-level.md) feature.
28+
Aliases containing filters are not a secure way to restrict access to individual documents, due to the limitations described in [Index and field names can be leaked when using aliases](/deploy-manage/security.md#alias-limitations). The {{stack-security-features}} provide a secure way to restrict access to documents through the [document-level security](/deploy-manage/users-roles/cluster-or-deployment-auth/controlling-access-at-document-field-level.md) feature.
2929

3030

3131
## Field and document level security limitations [field-document-limitations]
@@ -42,7 +42,7 @@ Until this limitation is addressed, avoid index and field names that contain con
4242

4343
## LDAP realm [_ldap_realm]
4444

45-
The [LDAP Realm](../../../deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md) does not currently support the discovery of nested LDAP Groups. For example, if a user is a member of `group_1` and `group_1` is a member of `group_2`, only `group_1` will be discovered. However, the [Active Directory Realm](../../../deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md) **does** support transitive group membership.
45+
The [LDAP Realm](/deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md) does not currently support the discovery of nested LDAP Groups. For example, if a user is a member of `group_1` and `group_1` is a member of `group_2`, only `group_1` will be discovered. However, the [Active Directory Realm](/deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md) **does** support transitive group membership.
4646

4747

4848
## Resource sharing check for users and API keys [can-access-resources-check]

raw-migrated-files/elasticsearch/elasticsearch-reference/ip-filtering.md

Lines changed: 0 additions & 143 deletions
This file was deleted.

raw-migrated-files/elasticsearch/elasticsearch-reference/security-limitations.md

Lines changed: 0 additions & 53 deletions
This file was deleted.

0 commit comments

Comments
 (0)