You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md
+22-22Lines changed: 22 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,6 +65,7 @@ If your Active Directory domain supports authentication with user-provided crede
65
65
1. The order in which the `active_directory` realm is consulted during an authentication attempt.
66
66
2. The primary domain in Active Directory. Binding to Active Directory fails if the domain name is not mapped in DNS.
67
67
3. The LDAP URL pointing to the Active Directory Domain Controller that should handle authentication. If you don’t specify the URL, it defaults to `ldap:<domain_name>:389`.
68
+
68
69
:::
69
70
70
71
:::{tab-item} Forest
@@ -86,18 +87,18 @@ If your Active Directory domain supports authentication with user-provided crede
1. The `domain_name` is set to the name of the root domain in the forest.
92
-
2. The `url` value used in this example has URLs for two different Domain Controllers, which are also Global Catalog servers. Port 3268 is the default port for unencrypted communication with the Global Catalog; port 3269 is the default port for SSL connections. The servers that are being connected to can be in any domain of the forest as long as they are also Global Catalog servers.
93
-
3. A load balancing setting is provided to indicate the desired behavior when choosing the server to connect to.
92
+
1. The `domain_name` is set to the name of the root domain in the forest.
93
+
2. The URLs for two different Domain Controllers, which are also Global Catalog servers. Port 3268 is the default port for unencrypted communication with the Global Catalog. Port 3269 is the default port for SSL connections. The servers that are being connected to can be in any domain of the forest as long as they are also Global Catalog servers.
94
+
3. A load balancing setting is provided to indicate the desired behavior when choosing the server to connect to.
94
95
95
96
96
-
In this configuration, users will need to use either their full User Principal Name (UPN) or their down-level logon name:
97
-
* A UPN is typically a concatenation of the username with `@<DOMAIN_NAME` such as `[email protected]`.
98
-
* The down-level logon name is the NetBIOS domain name, followed by a `\` and the username, such as `AD\johndoe`.
99
-
100
-
Use of down-level logon name requires a connection to the regular LDAP ports (389 or 636) in order to query the configuration container to retrieve the domain name from the NetBIOS name.
97
+
In this configuration, users will need to use either their full User Principal Name (UPN) or their down-level logon name:
98
+
* A UPN is typically a concatenation of the username with `@<DOMAIN_NAME` such as `[email protected]`.
99
+
* The down-level logon name is the NetBIOS domain name, followed by a `\` and the username, such as `AD\johndoe`.
100
+
101
+
Use of down-level logon name requires a connection to the regular LDAP ports (389 or 636) in order to query the configuration container to retrieve the domain name from the NetBIOS name.
101
102
:::
102
103
103
104
::::
@@ -155,11 +156,11 @@ To configure a bind user:
155
156
156
157
1. Configure the password for the `bind_dn` user by adding the appropriate `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` setting [to the {{es}} keystore](/deploy-manage/security/secure-settings.md).
157
158
158
-
In self-managed deployments, when a bind user is configured, connection pooling is enabled by default. Connection pooling can be disabled using the `user_search.pool.enabled` setting.
159
+
In self-managed deployments, when a bind user is configured, connection pooling is enabled by default. Connection pooling can be disabled using the `user_search.pool.enabled` setting.
159
160
160
-
:::{warning}
161
-
In {{ech}} and {{ece}}, after you configure `secure_bind_password`, any attempt to restart the deployment will fail until you complete the rest of the configuration steps. If you want to rollback the Active Directory realm configurations, you need to remove the `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` that was just added.
162
-
:::
161
+
:::{warning}
162
+
In {{ech}} and {{ece}}, after you configure `secure_bind_password`, any attempt to restart the deployment will fail until you complete the rest of the configuration steps. If you want to rollback the Active Directory realm configurations, you need to remove the `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` that was just added.
163
+
:::
163
164
164
165
## Step 3: Map Active Directory users and groups to roles
165
166
@@ -183,25 +184,24 @@ Only Active Directory security groups are supported. You can't map distribution
0 commit comments