@@ -6,22 +6,12 @@ You can configure {es} to use Public Key Infrastructure (PKI) certificates to
6
6
authenticate users. This requires clients connecting directly to {es} to
7
7
present X.509 certificates. The certificates must first be accepted for
8
8
authentication on the SSL/TLS layer on {es}. Only then they are optionally
9
- further validated by a PKI realm.
9
+ further validated by a PKI realm. See <<pki-realm-for-direct-clients>>.
10
10
11
11
You can also use PKI certificates to authenticate to {kib}, however this
12
- requires some <<pki-realm-for-proxied-clients,additional configuration>>. On
13
- {es}, this configuration enables {kib} to act as a proxy for SSL/TLS
14
- authentication and to submit the client certificates to {es} for further
15
- validation by a PKI realm.
16
-
17
- To use PKI in {es}, you configure a PKI realm, enable client authentication on
18
- the desired network layers (transport or http), and map the Distinguished Names
19
- (DNs) from the user certificates to roles. You create the mappings in a
20
- <<pki-role-mapping, role mapping file>> or use the
21
- <<security-api-put-role-mapping,create role mappings API>>. If you want the same
22
- users to also be authenticated using certificates when they connect to {kib},
23
- you must configure the {es} PKI realm to
24
- <<pki-realm-for-proxied-clients,allow delegation>> and to
25
- {kibana-ref}/kibana-authentication.html#pki-authentication[enable PKI authentication in {kib}].
12
+ requires some additional configuration. On {es}, this configuration enables {kib}
13
+ to act as a proxy for SSL/TLS authentication and to submit the client
14
+ certificates to {es} for further validation by a PKI realm. See
15
+ <<pki-realm-for-proxied-clients>>.
26
16
27
17
include::configuring-pki-realm.asciidoc[]
0 commit comments