Skip to content

Commit b253c93

Browse files
authored
Users roles 2: just users (#520)
1 parent 4dce399 commit b253c93

File tree

104 files changed

+5041
-6877
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

104 files changed

+5041
-6877
lines changed

deploy-manage/deploy/cloud-enterprise/add-custom-bundles-plugins.md

Lines changed: 415 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
---
2+
applies_to:
3+
deployment:
4+
ece:
5+
---
6+
7+
# Add plugins and extensions [ece-adding-plugins]
8+
9+
Plugins extend the core functionality of {{es}}. {{ece}} makes it easy to add plugins to your deployment by providing a number of plugins that work with your version of {{es}}. One advantage of these plugins is that you generally don’t have to worry about upgrading plugins when upgrading to a new {{es}} version, unless there are breaking changes. The plugins are upgraded along with the rest of your deployment.
10+
11+
Adding plugins to a deployment is as simple as selecting it from the list of available plugins, but different versions of {{es}} support different plugins. Plugins are available for different purposes, such as:
12+
13+
* National language support, phonetic analysis, and extended unicode support
14+
* Ingesting attachments in common formats and ingesting information about the geographic location of IP addresses
15+
* Adding new field datatypes to {{es}}
16+
17+
Additional plugins might be available. If a plugin is listed for your version of {{es}}, it can be used.
18+
19+
You can also [create](asciidocalypse://elasticsearch/docs/extend/create-elasticsearch-plugins.md) and add custom plugins.
20+
21+
To add plugins when creating a new deployment:
22+
23+
1. [Log into the Cloud UI](/deploy-manage/deploy/cloud-enterprise/log-into-cloud-ui.md) and select **Create deployment**.
24+
2. Make your initial deployment selections, then select **Customize Deployment**.
25+
3. Beneath the {{es}} master node, expand the **Manage plugins and settings** caret.
26+
4. Select the plugins you want.
27+
5. Select **Create deployment**.
28+
29+
The deployment spins up with the plugins installed.
30+
31+
To add plugins to an existing deployment:
32+
33+
1. [Log into the Cloud UI](/deploy-manage/deploy/cloud-enterprise/log-into-cloud-ui.md).
34+
2. On the **Deployments** page, select your deployment.
35+
36+
Narrow the list by name, ID, or choose from several other filters. To further define the list, use a combination of filters.
37+
38+
3. From your deployment menu, go to the **Edit** page.
39+
4. Beneath the {{es}} master node, expand the **Manage plugins and settings** caret.
40+
5. Select the plugins that you want.
41+
6. Select **Save changes**.
42+
43+
There is no downtime when adding plugins to highly available deployments. The deployment is updated with new nodes that have the plugins installed.

deploy-manage/deploy/elastic-cloud/azure-native-isv-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ $$$azure-integration-azure-user-management$$$Is the {{ecloud}} Azure Native ISV
179179
:alt: Error message displayed in the {{ecloud}} console: To access the resource {resource-name}
180180
:::
181181

182-
Share deployment resources directly with other Azure users by [configuring Active Directory single sign-on with the {{es}} cluster](../../users-roles/cluster-or-deployment-auth/openid-connect.md#ec-securing-oidc-azure).
182+
Share deployment resources directly with other Azure users by [configuring Active Directory single sign-on with the {{es}} cluster](/deploy-manage/users-roles/cluster-or-deployment-auth/oidc-examples.md#ec-securing-oidc-azure).
183183

184184

185185
$$$azure-integration-azure-rbac$$$Does {{ecloud}} Azure Native ISV Service support recently introduced {{ecloud}} RBAC capability?

deploy-manage/deploy/self-managed/configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ $$$elasticsearch-pingTimeout$$$ `elasticsearch.pingTimeout`
102102
: Time in milliseconds to wait for {{es}} to respond to pings. **Default: the value of the [`elasticsearch.requestTimeout`](#elasticsearch-requestTimeout) setting**
103103

104104
$$$elasticsearch-requestHeadersWhitelist$$$ `elasticsearch.requestHeadersWhitelist`
105-
: List of {{kib}} client-side headers to send to {{es}}. To send **no** client-side headers, set this value to [] (an empty list). Removing the `authorization` header from being whitelisted means that you cannot use [basic authentication](../../users-roles/cluster-or-deployment-auth/user-authentication.md#basic-authentication) in {{kib}}. **Default: `[ 'authorization', 'es-client-authentication' ]`**
105+
: List of {{kib}} client-side headers to send to {{es}}. To send **no** client-side headers, set this value to [] (an empty list). Removing the `authorization` header from being whitelisted means that you cannot use [basic authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication.md) in {{kib}}. **Default: `[ 'authorization', 'es-client-authentication' ]`**
106106

107107
$$$elasticsearch-requestTimeout$$$ `elasticsearch.requestTimeout`
108108
: Time in milliseconds to wait for responses from the back end or {{es}}. This value must be a positive integer. **Default: `30000`**
@@ -524,4 +524,4 @@ $$$settings-explore-data-in-chart$$$ `xpack.discoverEnhanced.actions.exploreData
524524
: Set this value to false to disable the Upgrade Assistant UI. **Default: true**
525525

526526
`i18n.locale` ![logo cloud](https://doc-icons.s3.us-east-2.amazonaws.com/logo_cloud.svg "Supported on {{ess}}")
527-
: Set this value to change the {{kib}} interface language. Valid locales are: `en`, `zh-CN`, `ja-JP`, `fr-FR`. **Default: `en`**
527+
: Set this value to change the {{kib}} interface language. Valid locales are: `en`, `zh-CN`, `ja-JP`, `fr-FR`. **Default: `en`**

deploy-manage/toc.yml

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -202,6 +202,8 @@ toc:
202202
- file: deploy/cloud-enterprise/resize-deployment.md
203203
children:
204204
- file: deploy/cloud-enterprise/resource-overrides.md
205+
- file: deploy/cloud-enterprise/add-plugins.md
206+
- file: deploy/cloud-enterprise/add-custom-bundles-plugins.md
205207
- file: deploy/cloud-enterprise/manage-integrations-server.md
206208
children:
207209
- file: deploy/cloud-enterprise/switch-from-apm-to-integrations-server-payload.md
@@ -613,14 +615,23 @@ toc:
613615
- file: users-roles/cluster-or-deployment-auth/kerberos.md
614616
- file: users-roles/cluster-or-deployment-auth/ldap.md
615617
- file: users-roles/cluster-or-deployment-auth/openid-connect.md
618+
children:
619+
- file: users-roles/cluster-or-deployment-auth/oidc-examples.md
616620
- file: users-roles/cluster-or-deployment-auth/saml.md
621+
children:
622+
- file: users-roles/cluster-or-deployment-auth/saml-entra.md
617623
- file: users-roles/cluster-or-deployment-auth/pki.md
618624
- file: users-roles/cluster-or-deployment-auth/custom.md
619625
- file: users-roles/cluster-or-deployment-auth/built-in-users.md
620-
- file: users-roles/cluster-or-deployment-auth/user-profiles.md
626+
children:
627+
- file: users-roles/cluster-or-deployment-auth/built-in-sm.md
628+
- file: users-roles/cluster-or-deployment-auth/orchestrator-managed-users-overview.md
629+
children:
630+
- file: users-roles/cluster-or-deployment-auth/manage-elastic-user-cloud.md
631+
- file: users-roles/cluster-or-deployment-auth/managed-credentials-eck.md
632+
- file: users-roles/cluster-or-deployment-auth/kibana-authentication.md
621633
- file: users-roles/cluster-or-deployment-auth/access-agreement.md
622634
- file: users-roles/cluster-or-deployment-auth/anonymous-access.md
623-
- file: users-roles/cluster-or-deployment-auth/manage-authentication-for-multiple-clusters.md
624635
- file: users-roles/cluster-or-deployment-auth/token-based-authentication-services.md
625636
- file: users-roles/cluster-or-deployment-auth/service-accounts.md
626637
- file: users-roles/cluster-or-deployment-auth/internal-users.md
@@ -629,8 +640,10 @@ toc:
629640
- file: users-roles/cluster-or-deployment-auth/configure-operator-privileges.md
630641
- file: users-roles/cluster-or-deployment-auth/operator-only-functionality.md
631642
- file: users-roles/cluster-or-deployment-auth/operator-privileges-for-snapshot-restore.md
643+
- file: users-roles/cluster-or-deployment-auth/user-profiles.md
632644
- file: users-roles/cluster-or-deployment-auth/looking-up-users-without-authentication.md
633645
- file: users-roles/cluster-or-deployment-auth/controlling-user-cache.md
646+
- file: users-roles/cluster-or-deployment-auth/manage-authentication-for-multiple-clusters.md
634647
- file: users-roles/cluster-or-deployment-auth/user-roles.md
635648
children:
636649
- file: users-roles/cluster-or-deployment-auth/defining-roles.md
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
ldap
2+
: Uses an external LDAP server to authenticate the users. This realm supports an authentication token in the form of username and password, and requires explicit configuration in order to be used. See [LDAP user authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md).
3+
4+
active_directory
5+
: Uses an external Active Directory Server to authenticate the users. With this realm, users are authenticated by usernames and passwords. See [Active Directory user authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md).
6+
7+
pki
8+
: Authenticates users using Public Key Infrastructure (PKI). This realm works in conjunction with SSL/TLS and identifies the users through the Distinguished Name (DN) of the client’s X.509 certificates. See [PKI user authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/pki.md).
9+
10+
saml
11+
: Facilitates authentication using the SAML 2.0 Web SSO protocol. This realm is designed to support authentication through {{kib}} and is not intended for use in the REST API. See [SAML authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/saml.md).
12+
13+
kerberos
14+
: Authenticates a user using Kerberos authentication. Users are authenticated on the basis of Kerberos tickets. See [Kerberos authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/kerberos.md).
15+
16+
oidc
17+
: Facilitates authentication using OpenID Connect. It enables {{es}} to serve as an OpenID Connect Relying Party (RP) and provide single sign-on (SSO) support in {{kib}}. See [Configuring single sign-on to the {{stack}} using OpenID Connect](/deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md).
18+
19+
jwt
20+
: Facilitates using JWT identity tokens as authentication bearer tokens. Compatible tokens are OpenID Connect ID Tokens, or custom JWTs containing the same claims. See [JWT authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/jwt.md).
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
native
2+
: Users are stored in a dedicated {{es}} index. This realm supports an authentication token in the form of username and password, and is available by default when no realms are explicitly configured. Users are managed through {{kib}}, or using [user management APIs](https://www.elastic.co/docs/api/doc/elasticsearch/group/endpoint-security). See [Native user authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/native.md).
3+
4+
file
5+
: Users are defined in files stored on each node in the {{es}} cluster. This realm supports an authentication token in the form of username and password and is always available. See [File-based user authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/file-based.md). Available for {{eck}} and self-managed deployments only.

deploy-manage/users-roles/cloud-enterprise-orchestrator.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
navigation_title: "ECE orchestrator"
3-
applies:
4-
ece: all
3+
applies_to:
4+
deployment:
5+
ece: all
56
---
67

78
# Elastic Cloud Enterprise orchestrator users

0 commit comments

Comments
 (0)