Skip to content

Commit cb1e59b

Browse files
committed
xref
1 parent 5d4ab11 commit cb1e59b

File tree

4 files changed

+34
-2
lines changed

4 files changed

+34
-2
lines changed

deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,14 @@ navigation_title: "Active Directory"
1515

1616
You can configure {{stack}} {{security-features}} to communicate with Active Directory to authenticate users.
1717

18+
:::{{tip}}
19+
This topic describes implementing Active Directory at the cluster or deployment level, for the purposes of authenticating with {{es}}.
20+
21+
You can also configure an {{ece}} installation to use an Active Directory to authenticate users. [Learn more](/deploy-manage/users-roles/cloud-enterprise-orchestrator/active-directory.md).
22+
:::
23+
24+
## How it works
25+
1826
The {{security-features}} use LDAP to communicate with Active Directory, so `active_directory` realms are similar to [`ldap` realms](/deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md). Like LDAP directories, Active Directory stores users and groups hierarchically. The directory’s hierarchy is built from containers such as the *organizational unit* (`ou`), *organization* (`o`), and *domain component* (`dc`).
1927

2028
The path to an entry is a *Distinguished Name* (DN) that uniquely identifies a user or group. User and group names typically have attributes such as a *common name* (`cn`) or *unique ID* (`uid`). A DN is specified as a string, for example `"cn=admin,dc=example,dc=com"` (white spaces are ignored).

deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,22 @@ navigation_title: LDAP
1515

1616
You can configure the {{stack}} {{security-features}} to communicate with a Lightweight Directory Access Protocol (LDAP) server to authenticate users. See [Configuring an LDAP realm](../../../deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md#ldap-realm-configuration).
1717

18+
To integrate with LDAP, you configure an `ldap` realm and map LDAP groups to user roles.
19+
20+
:::{{tip}}
21+
This topic describes implementing LDAP at the cluster or deployment level, for the purposes of authenticating with {{es}}.
22+
23+
You can also configure an {{ece}} installation to use an LDAP server to authenticate users. [Learn more](/deploy-manage/users-roles/cloud-enterprise-orchestrator/ldap.md).
24+
:::
25+
26+
## How it works
27+
1828
LDAP stores users and groups hierarchically, similar to the way folders are grouped in a file system. An LDAP directory’s hierarchy is built from containers such as the *organizational unit* (`ou`), *organization* (`o`), and *domain component* (`dc`).
1929

2030
The path to an entry is a *Distinguished Name* (DN) that uniquely identifies a user or group. User and group names typically have attributes such as a *common name* (`cn`) or *unique ID* (`uid`). A DN is specified as a string, for example `"cn=admin,dc=example,dc=com"` (white spaces are ignored).
2131

2232
The `ldap` realm supports two modes of operation, a user search mode and a mode with specific templates for user DNs.
2333

24-
To integrate with LDAP, you configure an `ldap` realm and map LDAP groups to user roles.
25-
2634
::::{important}
2735
When you configure realms in `elasticsearch.yml`, only the realms you specify are used for authentication. If you also want to use the `native` or `file` realms, you must include them in the realm chain.
2836
::::

deploy-manage/users-roles/cluster-or-deployment-auth/native.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,16 @@ The easiest way to manage and authenticate users is with the internal `native` r
1919

2020
In self-managed {{es}} clusters, you can also reset passwords for users in the native realm [using the command line](#reset-pw-cmd-line).
2121

22+
:::{{tip}}
23+
This topic describes using the native realm at the cluster or deployment level, for the purposes of authenticating with {{es}}.
24+
25+
You can also manage and authenticate users natively at the following levels:
26+
27+
* For an [{{ece}} installation](/deploy-manage/users-roles/cloud-enterprise-orchestrator/native-user-authentication.md).
28+
* For an [{{ecloud}} organization](/deploy-manage/users-roles/cloud-organization/manage-users.md).
29+
:::
30+
31+
2232
## Configure a native realm [native-realm-configuration]
2333

2434
The native realm is available and enabled by default. You can disable it explicitly with the following setting.

deploy-manage/users-roles/cluster-or-deployment-auth/pki.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,12 @@
11
---
22
mapped_pages:
33
- https://www.elastic.co/guide/en/elasticsearch/reference/current/pki-realm.html
4+
applies_to:
5+
deployment:
6+
self:
7+
ess:
8+
ece:
9+
eck:
410
---
511

612
# PKI [pki-realm]

0 commit comments

Comments
 (0)