You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md
+11-38Lines changed: 11 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,10 @@ The Active Directory realm authenticates users using an LDAP bind request. After
29
29
30
30
To integrate with Active Directory, you configure an `active_directory` realm and map Active Directory groups to user roles in {{es}}.
31
31
32
+
:::{tip}
33
+
If your Active Directory domain supports authentication with user-provided credentials, then you don't need to configure a `bind_dn`. [Learn more](#ece-ad-configuration-with-bind-user).
34
+
:::
35
+
32
36
## Step 1: Add a new realm configuration [ad-realm-configuration]
33
37
34
38
1. Add a realm configuration of type `active_directory` to `elasticsearch.yml` under the `xpack.security.authc.realms.active_directory` namespace. At a minimum, you must specify the Active Directory `domain_name` and `order`.
@@ -149,44 +153,13 @@ To configure a bind user:
149
153
150
154
1. The user to run as for all Active Directory search requests.
151
155
152
-
1. Configure the password for the `bind_dn` user by adding the appropriate `secure_bind_password` setting to the {{es}} keystore:
153
-
154
-
155
-
:::::{tab-set}
156
-
:group: cloud-eck-self
157
-
158
-
::::{tab-item} ECH and ECE
159
-
:sync: cloud
156
+
1. Configure the password for the `bind_dn` user by adding the appropriate `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` setting [to the {{es}} keystore](/deploy-manage/security/secure-settings.md).
160
157
161
-
1. From the **Deployments** page, select your deployment.
162
-
163
-
Narrow the list by name, ID, or choose from several other filters. To further define the list, use a combination of filters.
164
-
165
-
2. From your deployment menu, select **Security**.
166
-
3. Under the **{{es}} keystore** section, select **Add settings**.
167
-
4. On the **Create setting** window, select the secret **Type** to be `Secret String`.
168
-
5. Set the **Setting name** to `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` and add the password for the `bind_dn` user in the `secret` field.
169
-
170
-
:::{warning}
171
-
After you configure `secure_bind_password`, any attempt to restart the deployment will fail until you complete the rest of the configuration steps. If you wish to rollback the Active Directory realm related configuration effort, you need to remove the `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` that was just added by clicking **Remove** by the setting name under `Existing Keystores`.
172
-
:::
173
-
::::
158
+
In self-managed deployments, when a bind user is configured, connection pooling is enabled by default. Connection pooling can be disabled using the `user_search.pool.enabled` setting.
174
159
175
-
::::{tab-item} ECK
176
-
[Create a secure setting](/deploy-manage/security/secure-settings.md) for the `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` setting using Kubernetes secrets.
When a bind user is configured, connection pooling is enabled by default. Connection pooling can be disabled using the `user_search.pool.enabled` setting.
188
-
::::
189
-
:::::
160
+
:::{warning}
161
+
In {{ech}} and {{ece}}, after you configure `secure_bind_password`, any attempt to restart the deployment will fail until you complete the rest of the configuration steps. If you want to rollback the Active Directory realm configurations, you need to remove the `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` that was just added.
162
+
:::
190
163
191
164
## Step 3: Map Active Directory users and groups to roles
192
165
@@ -233,7 +206,7 @@ POST /_security/role_mapping/ldap-superuser <1>
233
206
### Example: Using a role mapping file [ece_using_the_role_mapping_files_2]
234
207
235
208
:::{tip}
236
-
If you're using {{ece}} or {{ech}}, then you must [upload this file as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced. If you're using {{eck}}, then install it as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md). If you're using a self-managed cluster, then the file must be present on each node.
209
+
If you're using {{ece}} or {{ech}}, then you must [upload this file as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced. If you're using {{eck}}, then install it as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins#use-a-volume-and-volume-mount-together-with-a-configmap-or-secret). If you're using a self-managed cluster, then the file must be present on each node.
237
210
:::
238
211
239
212
```sh
@@ -293,7 +266,7 @@ Clients and nodes that connect using SSL/TLS to the Active Directory server need
293
266
294
267
If you're using {{ech}} or {{ece}}, then you must [upload your certificate as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced.
295
268
296
-
If you're using {{eck}}, then install it as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md).
269
+
If you're using {{eck}}, then install it as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins#use-a-volume-and-volume-mount-together-with-a-configmap-or-secret).
0 commit comments