Skip to content

Commit a572aa8

Browse files
committed
added sections and references in credentials handling in ECK
1 parent 7749aaf commit a572aa8

File tree

1 file changed

+20
-0
lines changed

1 file changed

+20
-0
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/managed-credentials-eck.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,3 +72,23 @@ kubectl delete secret -l eck.k8s.elastic.co/credentials=true
7272
::::{warning}
7373
This command regenerates auto-generated credentials of **all** {{stack}} applications in the namespace.
7474
::::
75+
76+
## Creating custom users
77+
78+
### Native realm
79+
80+
You can create custom users in the {{es}} native realm using {{es}} user management APIs or {{kib}}.
81+
82+
Refer to [Native user authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/native.md) for more details.
83+
84+
### File realm
85+
86+
Custom users can also be created by providing the desired file realm content or a username and password in Kubernetes secrets, referenced in the {{es}} resource.
87+
88+
Refer to [File-based user authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/file-based.md) for extra details and examples.
89+
90+
## Creating custom roles
91+
92+
Roles can be specified using the Role management API, or the Role management UI in {{kib}}. Additionally, file-based role management can be achieved by referencing Kubernetes secrets containing the roles specification.
93+
94+
Refer to [Managing custom roles](/deploy-manage/users-roles/cluster-or-deployment-auth/defining-roles.md#managing-custom-roles) for details and examples.

0 commit comments

Comments
 (0)