Skip to content

Commit d6ef299

Browse files
jkakavasjrodewigAdam Locketvernum
authored
Add note in breaking changes for nameid_format (#77785)
* Add note in breaking changes for nameid_format We changed the default for `nameid_format` in 8.0 in #44090 but did not add anything to the breaking changes in the release notes. This change amends that. * remove reference to settings * Fix docs build * Accepting most of James' suggested changes Thanks James! Co-authored-by: James Rodewig <[email protected]> * Incorporating changes from Ioannis * Apply suggestions from code review Co-authored-by: Tim Vernum <[email protected]> * Apply suggestions from code review Co-authored-by: Ioannis Kakavas <[email protected]> Co-authored-by: James Rodewig <[email protected]> Co-authored-by: Adam Locke <[email protected]> Co-authored-by: Tim Vernum <[email protected]>
1 parent 5c6a481 commit d6ef299

File tree

1 file changed

+35
-3
lines changed

1 file changed

+35
-3
lines changed

docs/reference/migration/migrate_8_0/security.asciidoc

Lines changed: 35 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -165,6 +165,37 @@ Specifying this setting in a transport profile in `elasticsearch.yml` will
165165
result in an error on startup.
166166
====
167167

168+
[discrete]
169+
[[saml-realm-nameid-changes]]
170+
.The `nameid_format` SAML realm setting no longer has a default value.
171+
[%collapsible]
172+
====
173+
*Details* +
174+
In SAML, Identity Providers (IdPs) can either be explicitly configured to
175+
release a `NameID` with a specific format, or configured to attempt to conform
176+
with the requirements of a Service Provider (SP). The SP declares its
177+
requirements in the `NameIDPolicy` element of a SAML Authentication Request.
178+
In {es}, the `nameid_format` SAML realm setting controls the `NameIDPolicy`
179+
value.
180+
181+
Previously, the default value for `nameid_format` was
182+
`urn:oasis:names:tc:SAML:2.0:nameid-format:transient`. This setting created
183+
authentication requests that required the IdP to release `NameID` with a
184+
`transient` format.
185+
186+
The default value has been removed, which means that {es} will create SAML Authentication Requests by default that don't put this requirement on the
187+
IdP. If you want to retain the previous behavior, set `nameid_format` to
188+
`urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
189+
190+
*Impact* +
191+
If you currently don't configure `nameid_format` explicitly, it's possible
192+
that your IdP will reject authentication requests from {es} because the requests
193+
do not specify a `NameID` format (and your IdP is configured to expect one).
194+
This mismatch can result in a broken SAML configuration. If you're unsure whether
195+
your IdP is explicitly configured to use a certain `NameID` format and you want to retain current behavior
196+
, try setting `nameid_format` to `urn:oasis:names:tc:SAML:2.0:nameid-format:transient` explicitly.
197+
====
198+
168199
[discrete]
169200
[[ssl-validation-changes]]
170201
===== SSL/TLS configuration validation
@@ -287,7 +318,7 @@ on startup.
287318

288319
[discrete]
289320
[[ssl-misc-changes]]
290-
===== Other SSL/TLS changes
321+
===== Other SSL/TLS changes
291322

292323
.PKCS#11 keystores and trustores cannot be configured in `elasticsearch.yml`
293324
[%collapsible]
@@ -307,7 +338,7 @@ Use of a PKCS#11 keystore or truststore as the JRE's default store is not affect
307338
308339
*Impact* +
309340
If you have a PKCS#11 keystore configured within your `elasticsearch.yml` file, you must remove that
310-
configuration and switch to a supported keystore type, or configure your PKCS#11 keystore as the
341+
configuration and switch to a supported keystore type, or configure your PKCS#11 keystore as the
311342
JRE default store.
312343
====
313344

@@ -360,6 +391,7 @@ renamed to better reflect its intended use.
360391
Assign users with the `kibana_user` role to the `kibana_admin` role.
361392
Discontinue use of the `kibana_user` role.
362393
====
394+
363395
// end::notable-breaking-changes[]
364396

365397
// These are non-notable changes
@@ -373,7 +405,7 @@ Discontinue use of the `kibana_user` role.
373405
[%collapsible]
374406
====
375407
*Details* +
376-
If `xpack.security.fips_mode.enabled` is true (see <<fips-140-compliance>>),
408+
If `xpack.security.fips_mode.enabled` is true (see <<fips-140-compliance>>),
377409
the value of `xpack.security.authc.password_hashing.algorithm` now defaults to
378410
`pbkdf2_stretch`.
379411

0 commit comments

Comments
 (0)