Skip to content

Commit bf08acc

Browse files
committed
[DOCS] Creates redirects for role management APIs page
1 parent f559301 commit bf08acc

File tree

6 files changed

+21
-13
lines changed

6 files changed

+21
-13
lines changed

docs/reference/redirects.asciidoc

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -498,3 +498,12 @@ guide to the {painless}/index.html[Painless Scripting Language].
498498

499499
See the {painless}/painless-api-reference.html[Painless API Reference] in
500500
the guide to the {painless}/index.html[Painless Scripting Language].
501+
502+
[role="exclude", id="security-api-roles"]
503+
=== Role management APIs
504+
505+
You can use the following APIs to add, remove, and retrieve roles in the native realm:
506+
507+
* <<security-api-put-role,Create role>>, <<security-api-delete-role,Delete role>>
508+
* <<security-api-clear-role-cache,Clear roles cache>>
509+
* <<security-api-get-role,Get roles>>

x-pack/docs/en/rest-api/security.asciidoc

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,15 @@ You can use the following APIs to perform {security} activities.
1212
* <<security-api-tokens>>
1313
* <<security-api-users>>
1414

15-
include::security/roles.asciidoc[]
15+
[float]
16+
[[security-role-apis]]
17+
=== Roles
18+
19+
You can use the following APIs to add, remove, and retrieve roles in the native realm:
20+
21+
* <<security-api-put-role,Create role>>, <<security-api-delete-role,Delete role>>
22+
* <<security-api-clear-role-cache,Clear roles cache>>
23+
* <<security-api-get-role,Get roles>>
1624

1725
include::security/authenticate.asciidoc[]
1826
include::security/change-password.asciidoc[]

x-pack/docs/en/rest-api/security/role-mapping.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Role mappings have _rules_ that identify users and a list of _roles_ that are
2222
granted to those users.
2323

2424
NOTE: This API does not create roles. Rather, it maps users to existing roles.
25-
Roles can be created by using <<security-api-roles, Role Management APIs>> or
25+
Roles can be created by using <<security-role-apis,role management APIs>> or
2626
{xpack-ref}/defining-roles.html#roles-management-file[roles files].
2727

2828
The role mapping rule is a logical condition that is expressed using a JSON DSL.

x-pack/docs/en/rest-api/security/roles.asciidoc

Lines changed: 0 additions & 9 deletions
This file was deleted.

x-pack/docs/en/security/authorization/managing-roles.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ manage roles, log in to {kib} and go to *Management / Elasticsearch / Roles*.
130130
The _Role Management APIs_ enable you to add, update, remove and retrieve roles
131131
dynamically. When you use the APIs to manage roles in the `native` realm, the
132132
roles are stored in an internal {es} index. For more information and examples,
133-
see {ref}/security-api.html#security-api-roles[role management APIs].
133+
see {ref}/security-api.html#security-role-apis[role management APIs].
134134

135135
[float]
136136
[[roles-management-file]]

x-pack/docs/en/security/authorization/mapping-roles.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ the API, and other roles that are mapped through files.
1818

1919
When you use role-mappings, you assign existing roles to users.
2020
The available roles should either be added using the
21-
{ref}/security-api.html#security-api-roles[role management APIs] or defined in the
21+
{ref}/security-api.html#security-role-apis[role management APIs] or defined in the
2222
<<roles-management-file, roles file>>. Either role-mapping method can use
2323
either role management method. For example, when you use the role mapping API,
2424
you are able to map users to both API-managed roles and file-managed roles

0 commit comments

Comments
 (0)