1
1
==== Connect clients to {es}
2
2
3
- When you start {es} for the first time, TLS is configured automatically for the
4
- HTTP layer. A CA certificate is generated and stored on disk, and the hex-coded
5
- SHA-256 fingerprint of this certificate is also output to the terminal. Any
6
- clients that connect to {es} , such as the
3
+ When you start {es} for the first time, TLS is configured automatically for the
4
+ HTTP layer. A CA certificate is generated and stored on disk at
5
+ `$ES_HOME/config/certs/http_ca.crt` . The hex-encoded SHA-256 fingerprint of this
6
+ certificate is also output to the terminal. Any clients that connect to {es} ,
7
+ such as the
7
8
https://www.elastic.co/guide/en/elasticsearch/client/index.html[{es} Clients],
8
- {beats} , {ls} , and {fleet} must validate that they trust the certificate that
9
- {es} uses for HTTPS. Clients can establish trust by using either the fingerprint
10
- of the CA certificate or the CA certificate itself.
9
+ {beats} , standalone {agent} s, and {ls} must validate that they trust the
10
+ certificate that {es} uses for HTTPS. {fleet-server} and {fleet} -managed
11
+ {agent} s are automatically configured to trust the CA certificate.
12
+ Other clients can establish trust by using either the fingerprint of the CA
13
+ certificate or the CA certificate itself.
11
14
12
15
If the auto-configuration process already completed, you can still obtain the
13
16
fingerprint of the security certificate. You can also copy the CA certificate
@@ -29,8 +32,6 @@ path is to the auto-generated CA certificate for the HTTP layer.
29
32
openssl x509 -fingerprint -sha256 -in config/certs/http_ca.crt
30
33
----
31
34
32
- `<timestamp>`:: The timestamp of when the auto-configuration process created the security files directory.
33
-
34
35
The command returns the security certificate, including the fingerprint.
35
36
The `issuer` should be `Elasticsearch security auto-configuration HTTP CA`.
36
37
@@ -45,6 +46,6 @@ SHA256 Fingerprint=<fingerprint>
45
46
46
47
If your library doesn't support a method of validating the fingerprint, the
47
48
auto-generated CA certificate is created in the
48
- `config/certs` directory on each {es} node. Copy the
49
+ `$ES_HOME/ config/certs/ ` directory on each {es} node. Copy the
49
50
`http_ca.crt` file to your machine and configure your client to use this
50
51
certificate to establish trust when it connects to {es}.
0 commit comments