Skip to content

Commit c49a04c

Browse files
authored
Update remote-clusters-privileges-cert.asciidoc
Clarified **user** API key behavior in TLS based trust and recommended API key trust model for stricter access control
1 parent c272dda commit c49a04c

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

docs/reference/security/authentication/remote-clusters-privileges-cert.asciidoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,8 @@ On the remote cluster that contains the leader index, the {ccr} role requires
3333
the `read_ccr` cluster privilege, and `monitor` and `read` privileges on the
3434
leader index.
3535

36-
NOTE: If requests are authenticated with an <<security-api-create-api-key, API key>>, the API key
37-
requires the above privileges on the **local** cluster, instead of the remote.
36+
NOTE: When using a user <<security-api-create-api-key, API key>>, the required privileges must be granted on the **local cluster** only. The remote cluster will authorize based on the privileges embedded in the API key; **it does not use roles**. As a result, an API key may have broader or more limited access than the same user’s current role on the remote cluster.
37+
For stricter and more predictable access control, consider using the <<remote-clusters-api-key, cross-cluster API key trust model>>, which gives remote clusters full control over what data is accessible via cross-cluster operations. See <<remote-clusters-migration>>
3838

3939
NOTE: If requests are issued <<run-as-privilege,on behalf of other users>>,
4040
then the authenticating user must have the `run_as` privilege on the remote
@@ -136,8 +136,8 @@ local and remote clusters, and then create a user with the required roles.
136136
On the remote cluster, the {ccs} role requires the `read` and
137137
`read_cross_cluster` privileges for the target indices.
138138

139-
NOTE: If requests are authenticated with an <<security-api-create-api-key, API key>>, the API key
140-
requires the above privileges on the **local** cluster, instead of the remote.
139+
NOTE: When using a user <<security-api-create-api-key, API key>>, the required privileges must be granted on the **local cluster** only. The remote cluster will authorize based on the privileges embedded in the API key; **it does not use roles**. As a result, an API key may have broader or more limited access than the same user’s current role on the remote cluster.
140+
For stricter and more predictable access control, consider using the <<remote-clusters-api-key, cross-cluster API key trust model>>, which gives remote clusters full control over what data is accessible via cross-cluster operations. See <<remote-clusters-migration>>
141141

142142
NOTE: If requests are issued <<run-as-privilege,on behalf of other users>>,
143143
then the authenticating user must have the `run_as` privilege on the remote
@@ -299,4 +299,4 @@ POST /_security/role/logstash-reader
299299
}
300300
]
301301
}
302-
----
302+
----

0 commit comments

Comments
 (0)