Skip to content

Commit cf495a2

Browse files
committed
[DOCS] More edits
1 parent 88e0c43 commit cf495a2

File tree

2 files changed

+11
-18
lines changed

2 files changed

+11
-18
lines changed

x-pack/docs/en/security/authentication/configuring-pki-realm.asciidoc

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,12 @@
22
==== PKI authentication for clients connecting directly to {es}
33

44
To use PKI in {es}, you configure a PKI realm, enable client authentication on
5-
the desired network layers (transport or http), and map the Distinguished Name
6-
(DN) from the Subject field in the user certificate to roles by using the
7-
<<security-api-role-mapping,role-mapping API>> or the role-mapping file.
5+
the desired network layers (transport or http), and map the Distinguished Names
6+
(DNs) from the Subject field in the user certificates to roles. You create the mappings in a role mapping file or use the role mappings API.
7+
8+
If you want the same users to also be authenticated using certificates when they connect to {kib}, you must configure the {es} PKI realm to
9+
<<pki-realm-for-proxied-clients,allow delegation>> and to
10+
{kibana-ref}/kibana-authentication.html#pki-authentication[enable PKI authentication in {kib}].
811

912
You can also use a combination of PKI and username/password authentication. For
1013
example, you can enable SSL/TLS on the transport layer and define a PKI realm to

x-pack/docs/en/security/authentication/pki-realm.asciidoc

Lines changed: 5 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,22 +6,12 @@ You can configure {es} to use Public Key Infrastructure (PKI) certificates to
66
authenticate users. This requires clients connecting directly to {es} to
77
present X.509 certificates. The certificates must first be accepted for
88
authentication on the SSL/TLS layer on {es}. Only then they are optionally
9-
further validated by a PKI realm.
9+
further validated by a PKI realm. See <<pki-realm-for-direct-clients>>.
1010

1111
You can also use PKI certificates to authenticate to {kib}, however this
12-
requires some <<pki-realm-for-proxied-clients,additional configuration>>. On
13-
{es}, this configuration enables {kib} to act as a proxy for SSL/TLS
14-
authentication and to submit the client certificates to {es} for further
15-
validation by a PKI realm.
16-
17-
To use PKI in {es}, you configure a PKI realm, enable client authentication on
18-
the desired network layers (transport or http), and map the Distinguished Names
19-
(DNs) from the user certificates to roles. You create the mappings in a
20-
<<pki-role-mapping, role mapping file>> or use the
21-
<<security-api-put-role-mapping,create role mappings API>>. If you want the same
22-
users to also be authenticated using certificates when they connect to {kib},
23-
you must configure the {es} PKI realm to
24-
<<pki-realm-for-proxied-clients,allow delegation>> and to
25-
{kibana-ref}/kibana-authentication.html#pki-authentication[enable PKI authentication in {kib}].
12+
requires some additional configuration. On {es}, this configuration enables {kib}
13+
to act as a proxy for SSL/TLS authentication and to submit the client
14+
certificates to {es} for further validation by a PKI realm. See
15+
<<pki-realm-for-proxied-clients>>.
2616

2717
include::configuring-pki-realm.asciidoc[]

0 commit comments

Comments
 (0)