Skip to content

Commit bb53b30

Browse files
committed
Add details about username_rdn_name and username_rdn_oid to PKI security doc.
1 parent 482034e commit bb53b30

File tree

1 file changed

+15
-0
lines changed
  • deploy-manage/users-roles/cluster-or-deployment-auth

1 file changed

+15
-0
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/pki.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,21 @@ To use PKI in {{es}}, you configure a PKI realm, enable client authentication on
6363
If the regex is too restrictive and does not match the Subject DN of the client’s certificate, then the realm does not authenticate the certificate.
6464
::::
6565

66+
Alternatively, username can be extracted from a specific RDN attribute in the Subject DN by using [username_rdn_name](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#ref-pki-settings) or [username_rdn_oid](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#ref-pki-settings). When an RDN attribute configuration is provided, it supersedes `username_pattern`.
67+
68+
For example, to extract the username from the `CN` RDN attribute:
69+
70+
```yaml
71+
xpack:
72+
security:
73+
authc:
74+
realms:
75+
pki:
76+
pki1:
77+
order: 1
78+
username_rdn_name: "CN"
79+
```
80+
6681
3. Optional: If you want the same users to also be authenticated using certificates when they connect to {{kib}}, you must configure the {{es}} PKI realm to allow delegation. See [PKI authentication for clients connecting to {{kib}}](#pki-realm-for-proxied-clients).
6782
4. Restart {{es}} because realm configuration is not reloaded automatically. If you’re following through with the next steps, you might wish to hold the restart for last.
6883
5. If you're using a self-managed cluster, then [enable SSL/TLS](../../security/secure-cluster-communications.md#encrypt-internode-communication).

0 commit comments

Comments
 (0)