-
Notifications
You must be signed in to change notification settings - Fork 25.2k
Return a dependable, identifiable error when API Keys are not enabled #47759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
:Security/Authentication
Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc)
Team:Deployment Management
Meta label for Management Experience - Deployment Management team
Comments
Pinging @elastic/es-security (:Security/Authentication) |
Pinging @elastic/es-ui (:ES-UI) |
Discussed in #52311 |
tvernum
added a commit
to tvernum/elasticsearch
that referenced
this issue
Mar 23, 2020
This change adds a new exception with consistent metadata for when security features are not enabled. This allows clients to be able to tell that an API failed due to a configuration option, and respond accordingly. Relates: kibana#55255 Resolves: elastic#52311, elastic#47759 Backport of: elastic#52811
Resolved by #52811 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
:Security/Authentication
Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc)
Team:Deployment Management
Meta label for Management Experience - Deployment Management team
If
xpack.security.authc.api_key.enabled=false
then the API keys API responds to requests with this error:Currently, the UI needs to inspect the
message
string to determine whether the error is due to API keys being disabled or something else. This is brittle because there's no guarantee this message won't change.This could be addressed by #35665.
The text was updated successfully, but these errors were encountered: