Skip to content

Commit 8c65d15

Browse files
committed
Create new section for auto-generated passwords
Signed-off-by: Michael Montgomery <[email protected]>
1 parent bc2d0f0 commit 8c65d15

File tree

1 file changed

+18
-16
lines changed

1 file changed

+18
-16
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/managed-credentials-eck.md

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,11 @@ spec:
5050
count: 1
5151
```
5252
53-
## Rotate auto-generated credentials [k8s-rotate-credentials]
53+
## ECK auto-generated credentials
54+
55+
{{eck}} auto-generates credentials for the `elastic` user and other users. These credentials are stored in Kubernetes Secrets and are labeled with `eck.k8s.elastic.co/credentials=true`.
56+
57+
### Rotating auto-generated credentials [k8s-rotate-credentials]
5458

5559
You can force the auto-generated credentials to be regenerated with new values by deleting the appropriate Secret. For example, to change the password for the `elastic` user from the [quickstart example](/deploy-manage/deploy/cloud-on-k8s/elasticsearch-deployment-quickstart.md), use the following command:
5660

@@ -72,6 +76,19 @@ kubectl delete secret -l eck.k8s.elastic.co/credentials=true
7276
This command regenerates auto-generated credentials of **all** {{stack}} applications in the namespace.
7377
::::
7478

79+
### Controlling the length of auto-generated passwords
80+
```{applies_to}
81+
eck: ga 2.2
82+
```
83+
84+
:::{note}
85+
The ability to control the length of passwords for [file-based credentials](/deploy-manage/users-roles/cluster-or-deployment-auth/file-based.md) generated by {{eck}} requires an Enterprise license.
86+
:::
87+
88+
You can control the length of generated file-based passwords in {{eck}} installations by setting either `config.policies.passwords.length` in your Helm chart values or `password-length` in the `elastic-operator` `ConfigMap` when installing with YAML manifests. Refer to the [operator configuration documentation](../../deploy/cloud-on-k7s/configure-eck.md) for details on managing these settings.
89+
90+
Changing these values does not update existing passwords. To rotate current credentials, refer to the [rotating credentials documentation](#k7s-rotate-credentials)
91+
7592
## Creating custom users
7693

7794
{{eck}} provides functionality to facilitate custom user creation through various authentication realms. You can create users using the native realm, file realm, or external authentication methods.
@@ -99,18 +116,3 @@ For more information, refer to [External authentication](/deploy-manage/users-ro
99116
ECK facilitates file-based role management through Kubernetes secrets containing the roles specification. Alternatively, you can use the Role management API or the Role management UI in {{kib}}.
100117

101118
Refer to [Managing custom roles](/deploy-manage/users-roles/cluster-or-deployment-auth/defining-roles.md#managing-custom-roles) for details and ECK based examples.
102-
103-
## Controlling the length of ECK-generated passwords
104-
```{applies_to}
105-
eck: ga 3.2
106-
```
107-
108-
:::{note}
109-
The ability to control the length of passwords for [file-based credentials](/deploy-manage/users-roles/cluster-or-deployment-auth/file-based.md) generated by {{eck}} requires an Enterprise license.
110-
:::
111-
112-
You can control the length of generated file-based passwords in {{eck}} installations by setting either `config.policies.passwords.length` in your Helm chart values or `password-length` in the `elastic-operator` `ConfigMap` when installing with YAML manifests. Refer to the [operator configuration documentation](../../deploy/cloud-on-k8s/configure-eck.md) for details on managing these settings.
113-
114-
:::{note}
115-
Changing these values does not update existing passwords. To rotate current credentials, refer to the [rotating credentials documentation](#k8s-rotate-credentials)
116-
:::

0 commit comments

Comments
 (0)