Skip to content

Commit 0ca3678

Browse files
dedemortonjrodewigjkakavas
authored
Clarify docs about CA fingerprints and Fleet (#84056) (#84254)
Co-authored-by: James Rodewig <[email protected]> Co-authored-by: Ioannis Kakavas <[email protected]>
1 parent 76c8d12 commit 0ca3678

File tree

1 file changed

+11
-10
lines changed

1 file changed

+11
-10
lines changed

docs/reference/setup/install/connect-clients.asciidoc

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,16 @@
11
==== Connect clients to {es}
22

3-
When you start {es} for the first time, TLS is configured automatically for the
4-
HTTP layer. A CA certificate is generated and stored on disk, and the hex-coded
5-
SHA-256 fingerprint of this certificate is also output to the terminal. Any
6-
clients that connect to {es}, such as the
3+
When you start {es} for the first time, TLS is configured automatically for the
4+
HTTP layer. A CA certificate is generated and stored on disk at
5+
`$ES_HOME/config/certs/http_ca.crt`. The hex-encoded SHA-256 fingerprint of this
6+
certificate is also output to the terminal. Any clients that connect to {es},
7+
such as the
78
https://www.elastic.co/guide/en/elasticsearch/client/index.html[{es} Clients],
8-
{beats}, {ls}, and {fleet} must validate that they trust the certificate that
9-
{es} uses for HTTPS. Clients can establish trust by using either the fingerprint
10-
of the CA certificate or the CA certificate itself.
9+
{beats}, standalone {agent}s, and {ls} must validate that they trust the
10+
certificate that {es} uses for HTTPS. {fleet-server} and {fleet}-managed
11+
{agent}s are automatically configured to trust the CA certificate.
12+
Other clients can establish trust by using either the fingerprint of the CA
13+
certificate or the CA certificate itself.
1114

1215
If the auto-configuration process already completed, you can still obtain the
1316
fingerprint of the security certificate. You can also copy the CA certificate
@@ -29,8 +32,6 @@ path is to the auto-generated CA certificate for the HTTP layer.
2932
openssl x509 -fingerprint -sha256 -in config/certs/http_ca.crt
3033
----
3134

32-
`<timestamp>`:: The timestamp of when the auto-configuration process created the security files directory.
33-
3435
The command returns the security certificate, including the fingerprint.
3536
The `issuer` should be `Elasticsearch security auto-configuration HTTP CA`.
3637

@@ -45,6 +46,6 @@ SHA256 Fingerprint=<fingerprint>
4546

4647
If your library doesn't support a method of validating the fingerprint, the
4748
auto-generated CA certificate is created in the
48-
`config/certs` directory on each {es} node. Copy the
49+
`$ES_HOME/config/certs/` directory on each {es} node. Copy the
4950
`http_ca.crt` file to your machine and configure your client to use this
5051
certificate to establish trust when it connects to {es}.

0 commit comments

Comments
 (0)