@@ -69,8 +69,7 @@ See <<password-hashing-algorithms>>. Defaults to `bcrypt`.
69
69
[[anonymous-access-settings]]
70
70
==== Anonymous access settings
71
71
You can configure the following anonymous access settings in
72
- `elasticsearch.yml`. For more information, see {stack-ov}/anonymous-access.html[
73
- Enabling anonymous access].
72
+ `elasticsearch.yml`. For more information, see <<anonymous-access>>.
74
73
75
74
`xpack.security.authc.anonymous.username`::
76
75
The username (principal) of the anonymous user. Defaults to `_es_anonymous_user`.
@@ -120,8 +119,7 @@ Defaults to `48h` (48 hours).
120
119
121
120
You can set the following document and field level security
122
121
settings in `elasticsearch.yml`. For more information, see
123
- {stack-ov}/field-and-document-access-control.html[Setting up document and field
124
- level security].
122
+ <<field-and-document-access-control>>.
125
123
126
124
`xpack.security.dls_fls.enabled`::
127
125
Set to `false` to prevent document and field level security
@@ -206,7 +204,7 @@ xpack.security.authc.realms:
206
204
----------------------------------------
207
205
208
206
The valid settings vary depending on the realm type. For more
209
- information, see {stack-ov}/ setting-up-authentication.html[Setting up authentication] .
207
+ information, see << setting-up-authentication>> .
210
208
211
209
[float]
212
210
[[ref-realm-settings]]
@@ -245,8 +243,8 @@ Defaults to `ssha256`.
245
243
246
244
`authentication.enabled`:: If set to `false`, disables authentication support in
247
245
this realm, so that it only supports user lookups.
248
- (See the {stack-ov}/ run-as-privilege.html[ run as] and
249
- {stack-ov}/realm-chains.html# authorization_realms[ authorization realms] features).
246
+ (See the << run-as-privilege, run as>> and
247
+ << authorization_realms, authorization realms>> features).
250
248
Defaults to `true`.
251
249
252
250
[[ref-users-settings]]
@@ -261,7 +259,7 @@ the following settings:
261
259
`cache.ttl`::
262
260
The time-to-live for cached user entries. A user and a hash of its credentials
263
261
are cached for this configured period of time. Defaults to `20m`. Specify values
264
- using the standard {es} {ref}/common-options.html# time-units[ time units] .
262
+ using the standard {es} << time-units, time units>> .
265
263
Defaults to `20m`.
266
264
267
265
`cache.max_users`::
@@ -274,8 +272,8 @@ user credentials. See <<cache-hash-algo>>. Defaults to `ssha256`.
274
272
275
273
`authentication.enabled`:: If set to `false`, disables authentication support in
276
274
this realm, so that it only supports user lookups.
277
- (See the {stack-ov}/ run-as-privilege.html[ run as] and
278
- {stack-ov}/realm-chains.html# authorization_realms[ authorization realms] features).
275
+ (See the << run-as-privilege, run as>> and
276
+ << authorization_realms, authorization realms>> features).
279
277
Defaults to `true`.
280
278
281
279
[[ref-ldap-settings]]
@@ -326,14 +324,14 @@ The DN template that replaces the user name with the string `{0}`.
326
324
This setting is multivalued; you can specify multiple user contexts.
327
325
Required to operate in user template mode. If `user_search.base_dn` is specified,
328
326
this setting is not valid. For more information on
329
- the different modes, see {stack-ov}/ ldap-realm.html[LDAP realms] .
327
+ the different modes, see << ldap-realm>> .
330
328
331
329
`authorization_realms`::
332
330
The names of the realms that should be consulted for delegated authorization.
333
331
If this setting is used, then the LDAP realm does not perform role mapping and
334
332
instead loads the user from the listed realms. The referenced realms are
335
333
consulted in the order that they are defined in this list.
336
- See {stack-ov}/realm-chains.html# authorization_realms[Delegating authorization to another realm]
334
+ See << authorization_realms>>.
337
335
+
338
336
--
339
337
NOTE: If any settings starting with `user_search` are specified, the
@@ -350,7 +348,7 @@ to `memberOf`.
350
348
Specifies a container DN to search for users. Required
351
349
to operated in user search mode. If `user_dn_templates` is specified, this
352
350
setting is not valid. For more information on
353
- the different modes, see {stack-ov}/ ldap-realm.html[LDAP realms] .
351
+ the different modes, see << ldap-realm>> .
354
352
355
353
`user_search.scope`::
356
354
The scope of the user search. Valid values are `sub_tree`, `one_level` or
@@ -423,12 +421,12 @@ the filter. If not set, the user DN is passed into the filter. Defaults to Empt
423
421
If set to `true`, the names of any unmapped LDAP groups are used as role names
424
422
and assigned to the user. A group is considered to be _unmapped_ if it is not
425
423
referenced in a
426
- {stack-ov}/ mapping-roles.html#mapping-roles- file[ role-mapping file] . API-based
424
+ << mapping-roles- file, role-mapping file>> . API-based
427
425
role mappings are not considered. Defaults to `false`.
428
426
429
427
`files.role_mapping`::
430
- The <<security-files,location>> for the {stack-ov}/mapping-roles.html#mapping-roles[
431
- YAML role mapping configuration file] . Defaults to
428
+ The <<security-files,location>> for the
429
+ <<mapping-roles, YAML role mapping configuration file>> . Defaults to
432
430
`ES_PATH_CONF/role_mapping.yml`.
433
431
434
432
`follow_referrals`::
@@ -545,8 +543,8 @@ in-memory cached user credentials. See <<cache-hash-algo>>. Defaults to `ssha256
545
543
546
544
`authentication.enabled`:: If set to `false`, disables authentication support in
547
545
this realm, so that it only supports user lookups.
548
- (See the {stack-ov}/ run-as-privilege.html[ run as] and
549
- {stack-ov}/realm-chains.html# authorization_realms[ authorization realms] features).
546
+ (See the << run-as-privilege, run as>> and
547
+ << authorization_realms, authorization realms>> features).
550
548
Defaults to `true`.
551
549
552
550
[[ref-ad-settings]]
@@ -786,7 +784,7 @@ Java Cryptography Architecture documentation]. Defaults to the value of
786
784
`cache.ttl`::
787
785
Specifies the time-to-live for cached user entries. A user and a hash of its
788
786
credentials are cached for this configured period of time. Use the
789
- standard Elasticsearch {ref}/common-options.html# time-units[ time units] ).
787
+ standard Elasticsearch << time-units, time units>> ).
790
788
Defaults to `20m`.
791
789
792
790
`cache.max_users`::
@@ -799,8 +797,8 @@ the in-memory cached user credentials. See <<cache-hash-algo>>. Defaults to `ssh
799
797
800
798
`authentication.enabled`:: If set to `false`, disables authentication support in
801
799
this realm, so that it only supports user lookups.
802
- (See the {stack-ov}/ run-as-privilege.html[ run as] and
803
- {stack-ov}/realm-chains.html# authorization_realms[ authorization realms] features).
800
+ (See the << run-as-privilege, run as>> and
801
+ << authorization_realms, authorization realms>> features).
804
802
Defaults to `true`.
805
803
806
804
`follow_referrals`::
@@ -841,19 +839,19 @@ for SSL. This setting cannot be used with `certificate_authorities`.
841
839
842
840
`files.role_mapping`::
843
841
Specifies the <<security-files,location>> of the
844
- {stack-ov}/ mapping-roles.html[ YAML role mapping configuration file] .
842
+ << mapping-roles, YAML role mapping configuration file>> .
845
843
Defaults to `ES_PATH_CONF/role_mapping.yml`.
846
844
847
845
`authorization_realms`::
848
846
The names of the realms that should be consulted for delegated authorization.
849
847
If this setting is used, then the PKI realm does not perform role mapping and
850
848
instead loads the user from the listed realms.
851
- See {stack-ov}/realm-chains.html# authorization_realms[Delegating authorization to another realm]
849
+ See << authorization_realms>>.
852
850
853
851
`cache.ttl`::
854
852
Specifies the time-to-live for cached user entries. A user and a hash of its
855
853
credentials are cached for this period of time. Use the
856
- standard {es} {ref}/common-options.html# time-units[ time units] ).
854
+ standard {es} << time-units, time units>> ).
857
855
Defaults to `20m`.
858
856
859
857
`cache.max_users`::
@@ -973,7 +971,7 @@ provided by the SAML attributes. Defaults to `true`.
973
971
The names of the realms that should be consulted for delegated authorization.
974
972
If this setting is used, then the SAML realm does not perform role mapping and
975
973
instead loads the user from the listed realms.
976
- See {stack-ov}/realm-chains.html# authorization_realms[Delegating authorization to another realm]
974
+ See << authorization_realms>>.
977
975
978
976
`allowed_clock_skew`::
979
977
The maximum amount of skew that can be tolerated between the IdP's clock and the
@@ -987,7 +985,7 @@ authenticate the current user. The Authentication Context of the corresponding
987
985
authentication response should contain at least one of the requested values.
988
986
+
989
987
For more information, see
990
- {stack-ov}/saml-guide-authentication.html# req-authn-context[Requesting specific authentication methods] .
988
+ << req-authn-context>> .
991
989
992
990
[float]
993
991
[[ref-saml-signing-settings]]
@@ -1221,7 +1219,7 @@ cache at any given time. Defaults to 100,000.
1221
1219
The names of the realms that should be consulted for delegated authorization.
1222
1220
If this setting is used, then the Kerberos realm does not perform role mapping and
1223
1221
instead loads the user from the listed realms.
1224
- See {stack-ov}/realm-chains.html# authorization_realms[Delegating authorization to another realm]
1222
+ See << authorization_realms>>.
1225
1223
1226
1224
[float]
1227
1225
[[load-balancing]]
@@ -1264,7 +1262,7 @@ endif::[]
1264
1262
1265
1263
You can configure the following TLS/SSL settings in
1266
1264
`elasticsearch.yml`. For more information, see
1267
- {stack-ov}/ encrypting-communications.html[Encrypting communications] . These
1265
+ << encrypting-communications>> . These
1268
1266
settings are used unless they have been overridden by more specific
1269
1267
settings such as those for HTTP or Transport.
1270
1268
@@ -1422,7 +1420,7 @@ keystore files. See <<fips-140-compliance>>.
1422
1420
[[pkcs12-truststore-note]]
1423
1421
[NOTE]
1424
1422
Storing trusted certificates in a PKCS#12 file, although supported, is
1425
- uncommon in practice. The {ref}/ certutil.html[ `elasticsearch-certutil`] tool,
1423
+ uncommon in practice. The << certutil, `elasticsearch-certutil`>> tool,
1426
1424
as well as Java's `keytool`, are designed to generate PKCS#12 files that
1427
1425
can be used both as a keystore and as a truststore, but this may not be the
1428
1426
case for container files that are created using other tools. Usually,
@@ -1509,7 +1507,7 @@ See also <<remote-audit-settings>>.
1509
1507
[[ip-filtering-settings]]
1510
1508
==== IP filtering settings
1511
1509
1512
- You can configure the following settings for {stack-ov}/ ip-filtering.html[ IP filtering] .
1510
+ You can configure the following settings for << ip-filtering, IP filtering>> .
1513
1511
1514
1512
`xpack.security.transport.filter.allow`::
1515
1513
List of IP addresses to allow.
0 commit comments