File tree 1 file changed +5
-8
lines changed
x-pack/docs/en/security/authorization
1 file changed +5
-8
lines changed Original file line number Diff line number Diff line change @@ -39,14 +39,11 @@ this.
39
39
By default, role mappings are stored in `ES_PATH_CONF/role_mapping.yml`,
40
40
where `ES_PATH_CONF` is `ES_HOME/config` (zip/tar installations) or
41
41
`/etc/elasticsearch` (package installations). To specify a different location,
42
- you configure the `files.role_mapping` realm settings in `elasticsearch.yml`.
43
- This setting enables you to use a different set of mappings for each realm type:
44
-
45
- |=====
46
- | `xpack.security.authc.ldap.files.role_mapping` | | | The location of the role mappings for LDAP realms.
47
- | `xpack.security.authc.active_directory.files.role_mapping` | | | The location of the role mappings for Active Directory realms.
48
- | `xpack.security.authc.pki.files.role_mapping` | | | The location of the role mappings for PKI realms.
49
- |=====
42
+ you configure the `files.role_mapping` setting in the
43
+ {ref}/security-settings.html#ref-ad-settings[Active Directory],
44
+ {ref}/security-settings.html#ref-ldap-settings[LDAP], and
45
+ {ref}/security-settings.html#ref-pki-settings[PKI] realm settings in
46
+ `elasticsearch.yml`.
50
47
51
48
Within the role mapping file, the security roles are keys and groups and users
52
49
are values. The mappings can have a many-to-many relationship. When you map roles
You can’t perform that action at this time.
0 commit comments