Skip to content

Commit cae493c

Browse files
committed
ldap
1 parent d1faf40 commit cae493c

File tree

5 files changed

+320
-591
lines changed

5 files changed

+320
-591
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,6 @@ To integrate with Active Directory, you configure an `active_directory` realm an
114114

115115
4. Restart {{es}}.
116116

117-
118117
## Step 2: Configure a bind user (Optional) [ece-ad-configuration-with-bind-user]
119118

120119
You can choose to configure an Active Directory realm using a bind user.
@@ -234,7 +233,7 @@ POST /_security/role_mapping/ldap-superuser <1>
234233
### Example: Using a role mapping file [ece_using_the_role_mapping_files_2]
235234

236235
:::{tip}
237-
If you're using {{ece}} or {{ech}}, then you must [upload this file as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced. If you're using {{eck}}, then install it as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md).
236+
If you're using {{ece}} or {{ech}}, then you must [upload this file as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced. If you're using {{eck}}, then install it as a [custom configuration file](/deploy-manage/deploy/cloud-on-k8s/custom-configuration-files-plugins.md). If you're using a self-managed cluster, then the file must be present on each node.
238237
:::
239238

240239
```sh
@@ -290,7 +289,7 @@ $$$ece-ad-configuration-encrypt-communications$$$
290289

291290
To protect the user credentials that are sent for authentication, you should encrypt communications between {{es}} and your Active Directory server. Connecting using SSL/TLS ensures that the identity of the Active Directory server is authenticated before {{es}} transmits the user credentials and the usernames and passwords are encrypted in transit.
292291

293-
Clients and nodes that connect using SSL/TLS to the Active Directory server need to have the Active Directory server’s certificate or the server’s root CA certificate installed in their keystore or truststore.
292+
Clients and nodes that connect using SSL/TLS to the Active Directory server need to have the Active Directory server’s certificate or the server’s root CA certificate installed in their keystore or trust store.
294293

295294
If you're using {{ech}} or {{ece}}, then you must [upload your certificate as a custom bundle](/deploy-manage/deploy/elastic-cloud/upload-custom-plugins-bundles.md) before it can be referenced.
296295

@@ -301,11 +300,6 @@ If you're using {{eck}}, then install it as a [custom configuration file](/deplo
301300
If you're using {{ece}} or {{ech}}, then these steps are required only if TLS is enabled and the Active Directory controller is using self-signed certificates.
302301
:::
303302

304-
:::{note}
305-
306-
307-
The following example demonstrates how to trust a CA certificate (`cacert.pem`), which is located within the configuration directory.
308-
309303
::::{admonition} Certificate formats
310304
The following example uses a PEM encoded certificate. If your CA certificate is available as a `JKS` or `PKCS#12` keystore, you can reference it in the user settings. For example:
311305

@@ -318,6 +312,8 @@ If the keystore is also password protected (which isn’t typical for keystores
318312

319313
::::
320314

315+
The following example demonstrates how to trust a CA certificate (`cacert.pem`), which is located within the configuration directory.
316+
321317
```shell
322318
xpack:
323319
security:

0 commit comments

Comments
 (0)