Skip to content

Commit 7bae16a

Browse files
committed
edu feedback
1 parent acf497f commit 7bae16a

File tree

5 files changed

+134
-325
lines changed

5 files changed

+134
-325
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md

Lines changed: 11 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,10 @@ The Active Directory realm authenticates users using an LDAP bind request. After
2929

3030
To integrate with Active Directory, you configure an `active_directory` realm and map Active Directory groups to user roles in {{es}}.
3131

32+
:::{tip}
33+
If your Active Directory domain supports authentication with user-provided credentials, then you don't need to configure a `bind_dn`. [Learn more](#ece-ad-configuration-with-bind-user).
34+
:::
35+
3236
## Step 1: Add a new realm configuration [ad-realm-configuration]
3337

3438
1. Add a realm configuration of type `active_directory` to `elasticsearch.yml` under the `xpack.security.authc.realms.active_directory` namespace. At a minimum, you must specify the Active Directory `domain_name` and `order`.
@@ -149,44 +153,13 @@ To configure a bind user:
149153

150154
1. The user to run as for all Active Directory search requests.
151155

152-
1. Configure the password for the `bind_dn` user by adding the appropriate `secure_bind_password` setting to the {{es}} keystore:
153-
154-
155-
:::::{tab-set}
156-
:group: cloud-eck-self
157-
158-
::::{tab-item} ECH and ECE
159-
:sync: cloud
156+
1. Configure the password for the `bind_dn` user by adding the appropriate `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` setting [to the {{es}} keystore](/deploy-manage/security/secure-settings.md).
160157

161-
1. From the **Deployments** page, select your deployment.
162-
163-
Narrow the list by name, ID, or choose from several other filters. To further define the list, use a combination of filters.
164-
165-
2. From your deployment menu, select **Security**.
166-
3. Under the **{{es}} keystore** section, select **Add settings**.
167-
4. On the **Create setting** window, select the secret **Type** to be `Secret String`.
168-
5. Set the **Setting name** to `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` and add the password for the `bind_dn` user in the `secret` field.
169-
170-
:::{warning}
171-
After you configure `secure_bind_password`, any attempt to restart the deployment will fail until you complete the rest of the configuration steps. If you wish to rollback the Active Directory realm related configuration effort, you need to remove the `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` that was just added by clicking **Remove** by the setting name under `Existing Keystores`.
172-
:::
173-
::::
158+
In self-managed deployments, when a bind user is configured, connection pooling is enabled by default. Connection pooling can be disabled using the `user_search.pool.enabled` setting.
174159

175-
::::{tab-item} ECK
176-
[Create a secure setting](/deploy-manage/security/secure-settings.md) for the `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` setting using Kubernetes secrets.
177-
178-
::::
179-
180-
::::{tab-item} Self-managed
181-
182-
```shell
183-
bin/elasticsearch-keystore add \
184-
xpack.security.authc.realms.active_directory.my_ad.secure_bind_password
185-
```
186-
187-
When a bind user is configured, connection pooling is enabled by default. Connection pooling can be disabled using the `user_search.pool.enabled` setting.
188-
::::
189-
:::::
160+
:::{warning}
161+
In {{ech}} and {{ece}}, after you configure `secure_bind_password`, any attempt to restart the deployment will fail until you complete the rest of the configuration steps. If you want to rollback the Active Directory realm configurations, you need to remove the `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` that was just added.
162+
:::
190163

191164
## Step 3: Map Active Directory users and groups to roles
192165

@@ -233,7 +206,7 @@ POST /_security/role_mapping/ldap-superuser <1>
233206
### Example: Using a role mapping file [ece_using_the_role_mapping_files_2]
234207

235208
:::{tip}
236-
If you're using {{ece}} or {{ech}}, then you must [upload this file as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced. If you're using {{eck}}, then install it as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md). If you're using a self-managed cluster, then the file must be present on each node.
209+
If you're using {{ece}} or {{ech}}, then you must [upload this file as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced. If you're using {{eck}}, then install it as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins#use-a-volume-and-volume-mount-together-with-a-configmap-or-secret). If you're using a self-managed cluster, then the file must be present on each node.
237210
:::
238211

239212
```sh
@@ -293,7 +266,7 @@ Clients and nodes that connect using SSL/TLS to the Active Directory server need
293266

294267
If you're using {{ech}} or {{ece}}, then you must [upload your certificate as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced.
295268

296-
If you're using {{eck}}, then install it as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md).
269+
If you're using {{eck}}, then install it as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins#use-a-volume-and-volume-mount-together-with-a-configmap-or-secret).
297270

298271
:::{tip}
299272

0 commit comments

Comments
 (0)