Skip to content

Commit 88e0c43

Browse files
committed
[DOCS] Removes unnecessary section
1 parent 8128877 commit 88e0c43

File tree

3 files changed

+11
-21
lines changed

3 files changed

+11
-21
lines changed

docs/reference/redirects.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1004,7 +1004,7 @@ See <<kerberos-realm-configuration>>.
10041004
[role="exclude",id="configuring-pki-realm"]
10051005
=== Configuring a PKI realm
10061006

1007-
See <<pki-realm-configuration>>.
1007+
See <<pki-realm>>.
10081008

10091009
[role="exclude",id="pki-settings"]
10101010
==== PKI realm settings

x-pack/docs/en/security/authentication/configuring-pki-realm.asciidoc

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,3 @@
1-
You can configure {es} to use Public Key Infrastructure (PKI) certificates to
2-
authenticate users. This requires clients connecting directly to {es} to
3-
present X.509 certificates. The certificates must first be accepted for
4-
authentication on the SSL/TLS layer on {es}. Only then they are optionally
5-
further validated by a PKI realm.
6-
7-
Users may also use PKI certificates to authenticate to {kib}, however this
8-
requires some <<pki-realm-for-proxied-clients,additional configuration>>. On
9-
{es}, this configuration enables {kib} to act as a proxy for SSL/TLS
10-
authentication and to submit the client certificates to {es} for further
11-
validation by a PKI realm.
12-
131
[[pki-realm-for-direct-clients]]
142
==== PKI authentication for clients connecting directly to {es}
153

@@ -278,4 +266,3 @@ PUT /_security/role_mapping/direct_pki_only
278266

279267
<1> only when this metadata field is set (it is *not* `null`) the user has been
280268
authenticated in the delegation scenario.
281-

x-pack/docs/en/security/authentication/pki-realm.asciidoc

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,17 @@
22
[[pki-realm]]
33
=== PKI user authentication
44

5-
You can configure {stack} {security-features} to use Public Key Infrastructure
6-
(PKI) certificates to authenticate users in {es}. This requires clients to
7-
present X.509 certificates.
5+
You can configure {es} to use Public Key Infrastructure (PKI) certificates to
6+
authenticate users. This requires clients connecting directly to {es} to
7+
present X.509 certificates. The certificates must first be accepted for
8+
authentication on the SSL/TLS layer on {es}. Only then they are optionally
9+
further validated by a PKI realm.
810

9-
You can use PKI certificates to authenticate users in {es} as well as {kib}.
11+
You can also use PKI certificates to authenticate to {kib}, however this
12+
requires some <<pki-realm-for-proxied-clients,additional configuration>>. On
13+
{es}, this configuration enables {kib} to act as a proxy for SSL/TLS
14+
authentication and to submit the client certificates to {es} for further
15+
validation by a PKI realm.
1016

1117
To use PKI in {es}, you configure a PKI realm, enable client authentication on
1218
the desired network layers (transport or http), and map the Distinguished Names
@@ -18,7 +24,4 @@ you must configure the {es} PKI realm to
1824
<<pki-realm-for-proxied-clients,allow delegation>> and to
1925
{kibana-ref}/kibana-authentication.html#pki-authentication[enable PKI authentication in {kib}].
2026

21-
[[pki-realm-configuration]]
22-
==== Configuring a PKI realm
23-
2427
include::configuring-pki-realm.asciidoc[]

0 commit comments

Comments
 (0)