|
1 |
| -[role="xpack"] |
2 |
| -[[configuring-pki-realm]] |
3 |
| -=== Configuring a PKI realm |
4 |
| - |
5 |
| -You can configure {es} to use Public Key Infrastructure (PKI) certificates to |
6 |
| -authenticate users. This requires clients connecting directly to {es} to |
7 |
| -present X.509 certificates. The certificates must first be accepted for |
8 |
| -authentication on the SSL/TLS layer on {es}. Only then they are optionally |
9 |
| -further validated by a PKI realm. |
10 |
| - |
11 |
| -Users may also use PKI certificates to authenticate to {kib}, however this |
12 |
| -requires some <<pki-realm-for-proxied-clients,additional configuration>>. On |
13 |
| -{es}, this configuration enables {kib} to act as a proxy for SSL/TLS |
14 |
| -authentication and to submit the client certificates to {es} for further |
15 |
| -validation by a PKI realm. |
16 |
| - |
17 |
| -For more general information, see <<pki-realm>>. |
18 |
| - |
19 |
| -[float] |
20 |
| -[role="xpack"] |
21 | 1 | [[pki-realm-for-direct-clients]]
|
22 | 2 | ==== PKI authentication for clients connecting directly to {es}
|
23 | 3 |
|
24 | 4 | To use PKI in {es}, you configure a PKI realm, enable client authentication on
|
25 |
| -the desired network layers (transport or http), and map the Distinguished Name |
26 |
| -(DN) from the Subject field in the user certificate to roles by using the |
27 |
| -<<security-api-role-mapping,role-mapping API>> or the role-mapping file. |
| 5 | +the desired network layers (transport or http), and map the Distinguished Names |
| 6 | +(DNs) from the Subject field in the user certificates to roles. You create the mappings in a role mapping file or use the role mappings API. |
| 7 | + |
| 8 | +If you want the same users to also be authenticated using certificates when they connect to {kib}, you must configure the {es} PKI realm to |
| 9 | +<<pki-realm-for-proxied-clients,allow delegation>> and to |
| 10 | +{kibana-ref}/kibana-authentication.html#pki-authentication[enable PKI authentication in {kib}]. |
28 | 11 |
|
29 | 12 | You can also use a combination of PKI and username/password authentication. For
|
30 | 13 | example, you can enable SSL/TLS on the transport layer and define a PKI realm to
|
@@ -214,8 +197,6 @@ alternative to role mapping.
|
214 | 197 |
|
215 | 198 | --
|
216 | 199 |
|
217 |
| -[float] |
218 |
| -[role="xpack"] |
219 | 200 | [[pki-realm-for-proxied-clients]]
|
220 | 201 | ==== PKI authentication for clients connecting to {kib}
|
221 | 202 |
|
@@ -285,4 +266,3 @@ PUT /_security/role_mapping/direct_pki_only
|
285 | 266 | --------------------------------------------------
|
286 | 267 | <1> only when this metadata field is set (it is *not* `null`) the user has been
|
287 | 268 | authenticated in the delegation scenario.
|
288 |
| - |
0 commit comments