-
Notifications
You must be signed in to change notification settings - Fork 25.5k
backport ms graph plugin docs to 8.19 #130823
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 3 commits
669ca6b
aae426c
2f727ef
3668cfb
ec30efa
77d8b78
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
[[authentication]] | ||
== Authentication plugins | ||
|
||
Authentication plugins extend the functionality provided by the built-in {ref}/realms.html[authentication realms]. | ||
|
||
[discrete] | ||
=== Core authentication plugins | ||
|
||
<<ms-graph-authz,Microsoft Graph Authz>>:: | ||
The Microsoft Graph Authz plugin uses https://learn.microsoft.com/en-us/graph/api/user-list-memberof/[Microsoft Graph] to look up group membership information from Microsoft Entra ID | ||
|
||
include::ms-graph-authz.asciidoc[] |
Original file line number | Diff line number | Diff line change | ||||
---|---|---|---|---|---|---|
@@ -0,0 +1,112 @@ | ||||||
[[ms-graph-authz]] | ||||||
=== Microsoft Graph Authz | ||||||
|
||||||
The Microsoft Graph Authz plugin uses https://learn.microsoft.com/en-us/graph/api/user-list-memberof[Microsoft Graph] to look up group membership information from Microsoft Entra ID. | ||||||
|
||||||
This is primarily intended to work around the Microsoft Entra ID maximum group size limit (see https://learn.microsoft.com/en-us/security/zero-trust/develop/configure-tokens-group-claims-app-roles#group-overages[Group overages]). | ||||||
|
||||||
:plugin_name: microsoft-graph-authz | ||||||
include::install_remove.asciidoc[] | ||||||
|
||||||
|
||||||
[[configure-azure]] | ||||||
==== Configure Azure | ||||||
|
||||||
To make API calls to Microsoft Graph, Elasticsearch requires Azure credentials with the correct permissions. | ||||||
|
||||||
[discrete] | ||||||
==== Create a custom Azure application | ||||||
|
||||||
. Log in to the https://portal.azure.com[Azure portal] and go to Microsoft Entra ID. | ||||||
. To register a new application, click *Enterprise applications* > *New application*. | ||||||
. Click *Create your own application*, provide a name, and select the *Integrate any other application you don’t find in the gallery* option. | ||||||
|
||||||
image::images/01-create-enterprise-application.png["create your own application" page] | ||||||
|
||||||
[discrete] | ||||||
==== Configure the custom Application | ||||||
|
||||||
. In the https://portal.azure.com[Azure portal], go to Microsoft Entra ID. | ||||||
. Under *App registrations*, select the *All applications* tab, and then find the application created in the previous section. | ||||||
+ | ||||||
image::images/02-find-app-registration.png[find your app registration] | ||||||
. Take note of the *Application (client) ID* and *Tenant ID* shown here. | ||||||
These will be needed to configure Elasticsearch later. | ||||||
+ | ||||||
image::images/03-get-application-id.png[get your application ID] | ||||||
. Under *Manage* > *Certificates & secrets* | ||||||
- Create a new client secret. | ||||||
- Take note of your new client secret's *Value*. | ||||||
This is needed later, and is only displayed once. | ||||||
+ | ||||||
image::images/04-create-client-secret.png[get your client secret] | ||||||
. Under Manage > API permissions, do the following: | ||||||
|
. Under Manage > API permissions, do the following: | |
. Under **Manage** > **API permissions**, do the following: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.