Skip to content

Commit b8dc169

Browse files
committed
fix tests
1 parent cae493c commit b8dc169

File tree

5 files changed

+6
-7
lines changed

5 files changed

+6
-7
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ To configure a bind user:
173173
::::
174174

175175
::::{tab-item} ECK
176-
[Create a secure setting](/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-es-secure-settings) for the `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` setting using Kubernetes secrets.
176+
[Create a secure setting](/deploy-manage/security/secure-settings.md) for the `xpack.security.authc.realms.active_directory.<my_ad>.secure_bind_password` setting using Kubernetes secrets.
177177

178178
::::
179179

@@ -253,7 +253,7 @@ xpack:
253253
my_ad:
254254
order: 2
255255
domain_name: ad.example.com
256-
url: ldaps://ad.example.com:636 <1>
256+
url: ldaps://ad.example.com:636
257257
258258
ssl:
259259
certificate_authorities: ["/app/config/cacerts/ca.crt"]

deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ To configure an `ldap` realm with user search:
9696
::::
9797

9898
::::{tab-item} ECK
99-
[Create a secure setting](/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-es-secure-settings) for the `xpack.security.authc.realms.ldap.<ldap1>.secure_bind_password` setting using Kubernetes secrets.
99+
[Create a secure setting](/deploy-manage/security/secure-settings.md) for the `xpack.security.authc.realms.ldap.<ldap1>.secure_bind_password` setting using Kubernetes secrets.
100100

101101
::::
102102

@@ -248,7 +248,7 @@ xpack:
248248
verification_mode: certificate
249249
certificate_authorities: ["/app/config/cacerts/ca.crt"]
250250
files:
251-
role_mapping: "/app/config/mappings/role-mappings.yml" <1>
251+
role_mapping: "/app/config/mappings/role-mappings.yml"
252252
```
253253

254254
## User metadata in LDAP realms [ldap-user-metadata]

raw-migrated-files/cloud/cloud-heroku/ech-manage-kibana-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -304,7 +304,7 @@ To learn more, check [configuring Kibana to use OpenID Connect](/deploy-manage/u
304304

305305
### Anonymous authentication [echanonymous_authentication]
306306

307-
If you want to allow anonymous authentication in Kibana, these settings are supported in Elasticsearch Add-On for Heroku. To learn more on how to enable anonymous access, check [Enabling anonymous access](/deploy-manage/users-roles/cluster-or-deployment-auth/anonymous-access.md) and [Configuring Kibana to use anonymous authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/user-authentication.md#anonymous-authentication).
307+
If you want to allow anonymous authentication in Kibana, these settings are supported in Elasticsearch Add-On for Heroku. To learn more on how to enable anonymous access, check [Enabling anonymous access](/deploy-manage/users-roles/cluster-or-deployment-auth/anonymous-access.md) and [Configuring Kibana to use anonymous authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication.md#anonymous-authentication).
308308

309309
#### Supported versions before 8.0.0 [echsupported_versions_before_8_0_0]
310310

raw-migrated-files/cloud/cloud/ec-manage-kibana-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -304,7 +304,7 @@ To learn more, check [configuring Kibana to use OpenID Connect](/deploy-manage/u
304304

305305
### Anonymous authentication [ec_anonymous_authentication]
306306

307-
If you want to allow anonymous authentication in Kibana, these settings are supported in Elasticsearch Service. To learn more on how to enable anonymous access, check [Enabling anonymous access](/deploy-manage/users-roles/cluster-or-deployment-auth/anonymous-access.md) and [Configuring Kibana to use anonymous authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/user-authentication.md#anonymous-authentication).
307+
If you want to allow anonymous authentication in Kibana, these settings are supported in Elasticsearch Service. To learn more on how to enable anonymous access, check [Enabling anonymous access](/deploy-manage/users-roles/cluster-or-deployment-auth/anonymous-access.md) and [Configuring Kibana to use anonymous authentication](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-authentication.md#anonymous-authentication).
308308

309309
#### Supported versions before 8.0.0 [ec_supported_versions_before_8_0_0]
310310

raw-migrated-files/toc.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,6 @@ toc:
6363
- file: cloud/cloud-enterprise/ece-revoke-roles-token.md
6464
- file: cloud/cloud-enterprise/ece-secure-clusters-kerberos.md
6565
- file: cloud/cloud-enterprise/ece-secure-clusters-oidc.md
66-
- file: cloud/cloud-enterprise/ece-securing-clusters-ad.md
6766
- file: cloud/cloud-enterprise/ece-securing-clusters-JWT.md
6867
- file: cloud/cloud-enterprise/ece-securing-clusters-SAML.md
6968
- file: cloud/cloud-enterprise/ece-securing-clusters.md

0 commit comments

Comments
 (0)