Skip to content

Commit fad0d2d

Browse files
committed
[OpenAPI] Edit more security API summaries
1 parent 2fdec29 commit fad0d2d

File tree

23 files changed

+59
-17
lines changed

23 files changed

+59
-17
lines changed

specification/_doc_ids/table.csv

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ data-stream-path-param,https://www.elastic.co/guide/en/elasticsearch/reference/{
111111
data-streams,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/data-streams.html
112112
date-index-name-processor,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/date-index-name-processor.html
113113
dcg,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/search-rank-eval.html#_discounted_cumulative_gain_dcg
114+
defining-roles,https://www.elastic.co/guide/en/elasticsearch/reference/master/defining-roles.html
114115
delete-async-sql-search-api,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/delete-async-sql-search-api.html
115116
delete-enrich-policy-api,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/delete-enrich-policy-api.html
116117
delete-license,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/delete-license.html
@@ -569,6 +570,7 @@ security-api-saml-logout,https://www.elastic.co/guide/en/elasticsearch/reference
569570
security-api-saml-prepare-authentication,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-saml-prepare-authentication.html
570571
security-api-saml-sp-metadata,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-saml-sp-metadata.html
571572
security-api-ssl,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-ssl.html
573+
service-accounts,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html
572574
set-processor,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/set-processor.html
573575
shape,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/shape.html
574576
simulate-pipeline-api,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/simulate-pipeline-api.html
@@ -612,6 +614,7 @@ uppercase-processor,https://www.elastic.co/guide/en/elasticsearch/reference/{bra
612614
urldecode-processor,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/urldecode-processor.html
613615
usage-api,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/usage-api.html
614616
user-agent-processor,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/user-agent-processor.html
617+
user-profile,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/user-profile.html
615618
voting-config-exclusions,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/voting-config-exclusions.html
616619
watcher-api-ack-watch,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/watcher-api-ack-watch.html
617620
watcher-api-activate-watch,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/watcher-api-activate-watch.html

specification/security/get_user_privileges/SecurityGetUserPrivilegesRequest.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ import { RequestBase } from '@_types/Base'
2121
import { Name } from '@_types/common'
2222

2323
/**
24+
* Get user privileges.
2425
* @rest_spec_name security.get_user_privileges
2526
* @availability stack since=6.5.0 stability=stable
2627
* @availability serverless stability=stable visibility=private

specification/security/get_user_profile/Request.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,8 @@ import { UserProfileId } from '@security/_types/UserProfile'
2121
import { RequestBase } from '@_types/Base'
2222

2323
/**
24-
* Retrieves a user's profile using the unique profile ID.
24+
* Get a user profile.
25+
* Get a user's profile using the unique profile ID.
2526
* @rest_spec_name security.get_user_profile
2627
* @availability stack since=8.2.0 stability=stable
2728
* @availability serverless stability=stable visibility=private

specification/security/grant_api_key/SecurityGrantApiKeyRequest.ts

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,9 @@ import { Password, Username } from '@_types/common'
2222
import { ApiKeyGrantType, GrantApiKey } from './types'
2323

2424
/**
25-
* Creates an API key on behalf of another user.
26-
* This API is similar to Create API keys, however it creates the API key for a user that is different than the user that runs the API.
25+
* Grant an API key.
26+
* Create an API key on behalf of another user.
27+
* This API is similar to the create API keys API, however it creates the API key for a user that is different than the user that runs the API.
2728
* The caller must have authentication credentials (either an access token, or a username and password) for the user on whose behalf the API key will be created.
2829
* It is not possible to use this API to create an API key without that user’s credentials.
2930
* The user, for whom the authentication credentials is provided, can optionally "run as" (impersonate) another user.

specification/security/has_privileges/SecurityHasPrivilegesRequest.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,11 @@ import { ApplicationPrivilegesCheck, IndexPrivilegesCheck } from './types'
2424

2525
/**
2626
* Check user privileges.
27-
* Determines whether the specified user has a specified list of privileges.
27+
* Determine whether the specified user has a specified list of privileges.
2828
* @rest_spec_name security.has_privileges
2929
* @availability stack since=6.4.0 stability=stable
3030
* @availability serverless stability=stable visibility=public
31+
* @ext_doc_id security-privileges
3132
*/
3233
export interface Request extends RequestBase {
3334
path_parts: {

specification/security/has_privileges_user_profile/Request.ts

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,13 @@ import { RequestBase } from '@_types/Base'
2222
import { PrivilegesCheck } from './types'
2323

2424
/**
25+
* Check user profile privileges.
26+
* Determine whether the users associated with the specified user profile IDs have all the requested privileges.
2527
* @rest_spec_name security.has_privileges_user_profile
2628
* @availability stack since=8.3.0 stability=stable
2729
* @availability serverless stability=stable visibility=private
2830
* @cluster_privileges manage_user_profile
31+
* @ext_doc_id user-profile
2932
*/
3033
export interface Request extends RequestBase {
3134
body: {

specification/security/invalidate_api_key/SecurityInvalidateApiKeyRequest.ts

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,14 @@ import { Id, Name, Username } from '@_types/common'
2222

2323
/**
2424
* Invalidate API keys.
25-
* Invalidates one or more API keys.
25+
* This API invalidates API keys created by the create API key or grant API key APIs.
26+
* Invalidated API keys fail authentication, but they can still be viewed using the get API key information and query API key information APIs, for at least the configured retention period, until they are automatically deleted.
2627
* The `manage_api_key` privilege allows deleting any API keys.
2728
* The `manage_own_api_key` only allows deleting API keys that are owned by the user.
2829
* In addition, with the `manage_own_api_key` privilege, an invalidation request must be issued in one of the three formats:
2930
* - Set the parameter `owner=true`.
3031
* - Or, set both `username` and `realm_name` to match the user’s identity.
31-
* - Or, if the request is issued by an API key, i.e. an API key invalidates itself, specify its ID in the `ids` field.
32+
* - Or, if the request is issued by an API key, that is to say an API key invalidates itself, specify its ID in the `ids` field.
3233
* @rest_spec_name security.invalidate_api_key
3334
* @availability stack since=6.7.0 stability=stable
3435
* @availability serverless stability=stable visibility=public

specification/security/invalidate_token/SecurityInvalidateTokenRequest.ts

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,13 @@ import { RequestBase } from '@_types/Base'
2121
import { Name, Username } from '@_types/common'
2222

2323
/**
24+
* Invalidate a token.
25+
* The access tokens returned by the get token API have a finite period of time for which they are valid.
26+
* After that time period, they can no longer be used.
27+
* The time period is defined by the `xpack.security.authc.token.timeout` setting.
28+
*
29+
* The refresh tokens returned by the get token API are only valid for 24 hours. They can also be used exactly once.
30+
* If you want to invalidate one or more access or refresh tokens immediately, use this invalidate token API.
2431
* @rest_spec_name security.invalidate_token
2532
* @availability stack since=5.5.0 stability=stable
2633
* @availability serverless stability=stable visibility=private

specification/security/put_privileges/SecurityPutPrivilegesRequest.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,11 @@ import { Refresh } from '@_types/common'
2323
import { Actions } from './types'
2424

2525
/**
26+
* Create or update application privileges.
2627
* @rest_spec_name security.put_privileges
2728
* @availability stack since=6.4.0 stability=stable
2829
* @availability serverless stability=stable visibility=private
29-
*
30+
* @ext_doc_id security-privileges
3031
*/
3132
export interface Request extends RequestBase {
3233
query_parameters: {

specification/security/put_role/SecurityPutRoleRequest.ts

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,14 @@ import { RequestBase } from '@_types/Base'
2929
import { Metadata, Name, Refresh } from '@_types/common'
3030

3131
/**
32-
* Create or update roles API.
33-
*
34-
* Create or update roles in the native realm.
32+
* Create or update roles.
33+
* The role management APIs are generally the preferred way to manage roles in the native realm, rather than using file-based role management.
34+
* The create or update roles API cannot update roles that are defined in roles files.
3535
* @rest_spec_name security.put_role
3636
* @availability stack stability=stable
3737
* @availability serverless stability=stable visibility=public
3838
* @cluster_privileges manage_security
39+
* @ext_doc_id defining-roles
3940
*/
4041
export interface Request extends RequestBase {
4142
path_parts: {

0 commit comments

Comments
 (0)