You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/reference/elasticsearch/configuration-reference/security-settings.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -144,22 +144,6 @@ Large real-time clock inconsistency across cluster nodes can cause problems with
144
144
`xpack.security.authc.api_key.hashing.algorithm`
145
145
: ([Static](docs-content://deploy-manage/deploy/self-managed/configure-elasticsearch.md#static-cluster-setting)) Specifies the hashing algorithm that is used for securing API key credentials. See [Table 3, Secure token hashing algorithms](#secure-token-hashing-algorithms). Defaults to `ssha256`.
146
146
147
-
`xpack.security.authc.realms.saml.*`
148
-
: To learn more on how to enable SAML and related user settings, check [secure your clusters with SAML](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/saml.md).
149
-
150
-
`xpack.security.authc.realms.oidc.*`
151
-
: To learn more on how to enable OpenID Connect and related user settings, check [secure your clusters with OpenID Connect](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md).
152
-
153
-
`xpack.security.authc.realms.kerberos.*`
154
-
: To learn more on how to enable Kerberos and relate user settings, check [secure your clusters with Kerberos](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/kerberos.md).
155
-
156
-
`xpack.security.authc.realms.jwt.*`
157
-
: To learn more on how to enable JWT and related user settings, check [secure your clusters with JWT](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/jwt.md).
158
-
159
-
::::{note}
160
-
All SAML, OpenID Connect, Kerberos, and JWT settings are allowlisted.
`xpack.security.authc.realms.saml.*` 
171
+
: To learn more on how to enable SAML and related user settings, check [secure your clusters with SAML](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/saml.md).
172
+
173
+
`xpack.security.authc.realms.oidc.*`
174
+
: To learn more on how to enable OpenID Connect and related user settings, check [secure your clusters with OpenID Connect](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md).
175
+
176
+
`xpack.security.authc.realms.kerberos.*`
177
+
: To learn more on how to enable Kerberos and relate user settings, check [secure your clusters with Kerberos](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/kerberos.md).
178
+
179
+
`xpack.security.authc.realms.jwt.*`
180
+
: To learn more on how to enable JWT and related user settings, check [secure your clusters with JWT](docs-content://deploy-manage/users-roles/cluster-or-deployment-auth/jwt.md).
181
+
182
+
::::{note}
183
+
All SAML, OpenID Connect, Kerberos, and JWT settings are allowlisted.
184
+
::::
185
+
186
186
You configure realm settings in the `xpack.security.authc.realms` namespace in `elasticsearch.yml`.
Copy file name to clipboardExpand all lines: docs/reference/elasticsearch/configuration-reference/watcher-settings.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -461,15 +461,15 @@ You can configure the following Slack notification settings in `elasticsearch.ym
461
461
`xpack.notification.slack`
462
462
: Configures [Slack notification settings](docs-content://explore-analyze/alerts-cases/watcher/actions-slack.md). Note that you need to add `secure_url` as a [secret value to the keystore](docs-content://deploy-manage/security/secure-settings.md).
463
463
464
-
`xpack.notification.slack.default_account`
464
+
`xpack.notification.slack.default_account`
465
465
: ([Dynamic](docs-content://deploy-manage/deploy/self-managed/configure-elasticsearch.md#dynamic-cluster-setting)) Default Slack account to use.
466
466
467
467
If you configure multiple Slack accounts, you must either configure this setting or specify the Slack account to use in the [`slack`](docs-content://explore-analyze/alerts-cases/watcher/actions-slack.md) action. See [Configuring Slack Accounts](docs-content://explore-analyze/alerts-cases/watcher/actions-slack.md#configuring-slack).
468
468
469
469
470
470
$$$slack-account-attributes$$$
471
471
472
-
`xpack.notification.slack.account`
472
+
`xpack.notification.slack.account`
473
473
: Specifies account information for sending notifications via Slack. You can specify the following Slack account attributes:
474
474
475
475
`secure_url`
@@ -534,15 +534,15 @@ You can configure the following PagerDuty notification settings in `elasticsearc
534
534
`xpack.notification.pagerduty`
`xpack.notification.pagerduty.default_account`
538
538
: ([Dynamic](docs-content://deploy-manage/deploy/self-managed/configure-elasticsearch.md#dynamic-cluster-setting)) Default PagerDuty account to use.
539
539
540
540
If you configure multiple PagerDuty accounts, you must either configure this setting or specify the PagerDuty account to use in the [`pagerduty`](docs-content://explore-analyze/alerts-cases/watcher/actions-pagerduty.md) action. See [Configuring PagerDuty accounts](docs-content://explore-analyze/alerts-cases/watcher/actions-pagerduty.md#configuring-pagerduty).
541
541
542
542
543
543
$$$pagerduty-account-attributes$$$
544
544
545
-
`xpack.notification.pagerduty.account`
545
+
`xpack.notification.pagerduty.account`
546
546
: Specifies account information for sending notifications via PagerDuty. You can specify the following PagerDuty account attributes:
0 commit comments