You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: x-pack/docs/en/security/authentication/oidc-guide.asciidoc
+11-12
Original file line number
Diff line number
Diff line change
@@ -5,8 +5,7 @@
5
5
6
6
The Elastic Stack supports single sign-on (SSO) using OpenID Connect via {kib} using
7
7
{es} as the backend service that holds most of the functionality. {kib} and {es}
8
-
together represent an OpenID Connect Relying Party (RP) that supports the Authorization
9
-
Code Flow as this is defined in the OpenID Connect specification.
8
+
together represent an OpenID Connect Relying Party (RP) that supports the authorization code flow and implicit flow as these are defined in the OpenID Connect specification.
10
9
11
10
This guide assumes that you have an OpenID Connect Provider where the
12
11
Elastic Stack Relying Party will be registered.
@@ -39,8 +38,8 @@ RP that you commonly need to provide for registration are the following:
39
38
nor the Elastic Stack implementation impose any constraints on this value.
40
39
- `Redirect URI`: This is the URI where the OP will redirect the user's browser after authentication. The
41
40
appropriate value for this will depend on your setup and whether or not {kib} sits behind a proxy or
42
-
load balancer. It will typically be +$\{kibana-url}/api/security/v1/oidc+ where _$\{kibana-url}_
43
-
is the base URL for your {kib} instance. You might also see this called `Callback URI`.
41
+
load balancer. It will typically be +$\{kibana-url}/api/security/v1/oidc+ (for the authorization code flow) or +$\{kibana-url}/api/security/v1/oidc/implicit+ (for the implicit flow) where _$\{kibana-url}_ is the base URL for your {kib} instance. You might also see this
42
+
called `Callback URI`.
44
43
45
44
At the end of the registration process, the OP will assign a Client Identifier and a Client Secret for the RP ({stack}) to use.
46
45
Note these two values as they will be used in the {es} configuration.
@@ -158,8 +157,8 @@ op.authorization_endpoint::
158
157
159
158
op.token_endpoint::
160
159
The URL for the Token Endpoint in the OpenID Connect Provider. This is the endpoint where
161
-
{es} will send a request to exchange the code for an ID Token, in the case where the Authorization Code
162
-
flow is used. The value for this setting should be provided by your OpenID Connect Provider.
160
+
{es} will send a request to exchange the code for an ID Token. This setting is optional when
161
+
you use the implicit flow. The value for this setting should be provided by your OpenID Connect Provider.
163
162
164
163
op.jwkset_path::
165
164
The path to a file or a URL containing a JSON Web Key Set with the key material that the OpenID Connect
@@ -522,23 +521,23 @@ The three additional settings that are required for OpenID Connect support are s
0 commit comments