-
Notifications
You must be signed in to change notification settings - Fork 181
Emphasise that OIDC is only for interactive users #3875
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from 4 commits
d5d8475
6e570b2
d2f4534
ca878e6
bdd803d
235911c
7d9babc
7fd46b9
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||
|---|---|---|---|---|---|---|---|---|
|
|
@@ -470,6 +470,11 @@ xpack.security.authc.providers: | |||||||
|
|
||||||||
| The OpenID Connect realm is designed to allow users to authenticate to {{kib}}. As a result, most sections of this guide assume {{kib}} is used. This section describes how a custom web application could use the relevant OpenID Connect REST APIs to authenticate the users to {{es}} with OpenID Connect. | ||||||||
|
|
||||||||
| ::::{note} | ||||||||
| The OpenID Connect protocol enables authentication for interactive users via a web browser. Users must be able to open a login URL in their browser and enter credentials when prompted. | ||||||||
| {{es}} does not support using OpenID Connect to authenticate non-interactive users such as service principals or automated processes. If you wish to authenticate a service, the [JWT](jwt.md) realm may be a suitable alternative. | ||||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Suggestion: it might help to clarify that the JWT realm does (or at least, can) leverage the customer's existing OpenID Provider as the source of signed JWTs and provides the PKI for verifying said JWTs? My sense from the SDHs we have had is that customers tend to think "JWT realm" is something alien that will take them away from the comfort and familiarity of their Entra, Okta, etc setups. They're not seeing their infra fitting into the picture.
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Probably. I struggled to come up with the right words that were succinct enough but didn't over promise. Whether JWT actually Do you have suggested words? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
is what I can come up with. If we don't like parentheses, we can probably re-arrange it a bit!
Collaborator
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||||
| :::: | ||||||||
|
|
||||||||
| Single sign-on realms such as OpenID Connect and SAML make use of the Token Service in {{es}} and in principle exchange a SAML or OpenID Connect Authentication response for an {{es}} access token and a refresh token. The access token is used as credentials for subsequent calls to {{es}}. The refresh token enables the user to get new {{es}} access tokens after the current one expires. | ||||||||
|
|
||||||||
| ::::{note} | ||||||||
|
|
||||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.