Skip to content

Commit 8acb0dc

Browse files
committed
clean up tocs
1 parent 098edca commit 8acb0dc

File tree

10 files changed

+13
-896
lines changed

10 files changed

+13
-896
lines changed

deploy-manage/deploy/elastic-cloud/azure-native-isv-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ $$$azure-integration-azure-user-management$$$Is the {{ecloud}} Azure Native ISV
175175
:alt: Error message displayed in the {{ecloud}} console: To access the resource {resource-name}
176176
:::
177177

178-
Share deployment resources directly with other Azure users by [configuring Active Directory single sign-on with the {{es}} cluster](../../users-roles/cluster-or-deployment-auth/openid-connect.md#ec-securing-oidc-azure).
178+
Share deployment resources directly with other Azure users by [configuring Active Directory single sign-on with the {{es}} cluster](/deploy-manage/users-roles/cluster-or-deployment-auth/oidc-examples.md#ec-securing-oidc-azure).
179179

180180

181181
$$$azure-integration-azure-rbac$$$Does {{ecloud}} Azure Native ISV Service support recently introduced {{ecloud}} RBAC capability?

deploy-manage/toc.yml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -636,7 +636,12 @@ toc:
636636
- file: users-roles/cluster-or-deployment-auth/saml-entra.md
637637
- file: users-roles/cluster-or-deployment-auth/pki.md
638638
- file: users-roles/cluster-or-deployment-auth/custom.md
639-
- file: users-roles/cluster-or-deployment-auth/built-in-users.md
639+
- file: users-roles/cluster-or-deployment-auth/built-in-overview.md
640+
children:
641+
- file: users-roles/cluster-or-deployment-auth/built-in-users.md
642+
- file: users-roles/cluster-or-deployment-auth/manage-elastic-user-cloud.md
643+
- file: users-roles/cluster-or-deployment-auth/built-in-eck.md
644+
- file: users-roles/cluster-or-deployment-auth/built-in-sm.md
640645
- file: users-roles/cluster-or-deployment-auth/kibana-authentication.md
641646
- file: users-roles/cluster-or-deployment-auth/access-agreement.md
642647
- file: users-roles/cluster-or-deployment-auth/anonymous-access.md

deploy-manage/users-roles/cloud-enterprise-orchestrator/saml.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Begin the provider profile by adding the general settings:
5959

6060
## Map SAML attributes to user properties [ece-saml-attributes]
6161

62-
The SAML assertion about a user usually includes attribute names and values that can be used for role mapping. The configuration in this section allows to configure a mapping between these SAML attribute values and [{{es}} user properties](/deploy-manage/users-roles/cluster-or-deployment-auth/saml.md#saml-elasticsearch-authentication).
62+
The SAML assertion about a user usually includes attribute names and values that can be used for role mapping. The configuration in this section allows to configure a mapping between these SAML attribute values and [{{es}} user properties](/deploy-manage/users-roles/cluster-or-deployment-auth/saml.md#saml-es-user-properties).
6363

6464
When the attributes have been mapped to user properties such as `groups`, these can then be used to configure [role mappings](#ece-saml-role-mapping). Mapping the `principal` user property is required and the `groups` property is recommended for a minimum configuration.
6565

deploy-manage/users-roles/cluster-or-deployment-auth/oidc-examples.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,7 @@ This page explains how to implement OIDC, from the OAuth client credentials gene
1818
* [Google](#ec-securing-oidc-google)
1919
* [Okta](#ec-securing-oidc-okta)
2020

21-
For further detail about configuring OIDC, check our [list of references](#ec-summary-and-references) at the end of this article.
22-
21+
For further detail about configuring OIDC, refer to [](/deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md)
2322

2423
## Setting up OpenID Connect with Azure [ec-securing-oidc-azure]
2524

deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ To configure claims mapping:
219219

220220
4. Configure the OpenID Connect realm in {{es}} to associate the [{{es}} user properties](#oidc-user-properties) to the name of the claims that your OP will release.
221221

222-
The [sample configuration](oidc-create-realm) configures the `principal` and `groups` user properties as follows:
222+
The [sample configuration](#oidc-create-realm) configures the `principal` and `groups` user properties as follows:
223223

224224
* `claims.principal: sub`: Instructs {{es}} to look for the OpenID Connect claim named `sub` in the ID Token that the OP issued for the user (or in the UserInfo response) and assign the value of this claim to the `principal` user property.
225225

@@ -401,7 +401,7 @@ PUT /_security/role_mapping/oidc-finance
401401

402402
### Delegating OIDC authorization to another realm
403403

404-
If your users also exist in a repository that can be directly accessed by {{es}}, such as an LDAP directory, then you can use [authorization realms](/deploy-manage/users-roles/cluster-or-deployment-auth/authorization-delegation) instead of role mappings.
404+
If your users also exist in a repository that can be directly accessed by {{es}}, such as an LDAP directory, then you can use [authorization realms](/deploy-manage/users-roles/cluster-or-deployment-auth/authorization-delegation.md) instead of role mappings.
405405

406406
In this case, you perform the following steps:
407407

deploy-manage/users-roles/cluster-or-deployment-auth/saml.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The {{security-features}} provide this support using the Web Browser SSO profile
2727

2828
This means that the SAML realm is not suitable for use by standard REST clients. If you configure a SAML realm for use in {{kib}}, you should also configure another realm, such as the [native realm](/deploy-manage/users-roles/cluster-or-deployment-auth/native.md) in your authentication chain.
2929

30-
Because this feature is designed with {{kib}} in mind, most sections of this guide assume {{kib}} is used. To learn how a custom web application could use the OpenID Connect REST APIs to authenticate the users to {{es}} with SAML, refer to [SAML without {{kib}}](#saml-without-kibana).
30+
Because this feature is designed with {{kib}} in mind, most sections of this guide assume {{kib}} is used. To learn how a custom web application could use the OpenID Connect REST APIs to authenticate the users to {{es}} with SAML, refer to [SAML without {{kib}}](#saml-no-kibana).
3131

3232
The SAML support in {{kib}} is designed with the expectation that it will be the primary (or sole) authentication method for users of that {{kib}} instance. After you enable SAML authentication in {{kib}}, it will affect all users who try to login. The [Configuring {{kib}}](/deploy-manage/users-roles/cluster-or-deployment-auth/saml.md#saml-configure-kibana) section provides more detail about how this works.
3333

@@ -746,7 +746,7 @@ Single sign-on realms such as OpenID Connect and SAML make use of the Token Serv
746746

747747
### SAML realm [saml-no-kibana-realm]
748748

749-
You must create a SAML realm and configure it accordingly in {{es}}. See [Configure {{es}} for SAML authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/saml.md#saml-elasticsearch-authentication)
749+
You must create a SAML realm and configure it accordingly in {{es}}. See [Configure {{es}} for SAML authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/saml.md#saml-create-realm)
750750

751751

752752
### Service Account user for accessing the APIs [saml-no-kibana-user]

raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-rotate-credentials.md

Lines changed: 0 additions & 30 deletions
This file was deleted.

raw-migrated-files/elasticsearch/elasticsearch-reference/built-in-users.md

Lines changed: 0 additions & 153 deletions
This file was deleted.

0 commit comments

Comments
 (0)