Skip to content

Commit 0e7d578

Browse files
authored
[DOCS] Stages removal of security content (#624)
1 parent 3cbb245 commit 0e7d578

File tree

7 files changed

+232
-22
lines changed

7 files changed

+232
-22
lines changed

docs/en/stack/redirects.asciidoc

Lines changed: 195 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -317,3 +317,198 @@ This page has moved. See:
317317
** {metricbeat-ref}/monitoring.html[Metricbeat]
318318
** {packetbeat-ref}/monitoring.html[Packetbeat]
319319
** {winlogbeat-ref}/monitoring.html[Winlogbeat]
320+
321+
[role="exclude",id="auditing"]
322+
=== Auditing security events
323+
324+
This page has moved.
325+
//See {ref}/auditing.html[Auditing security events].
326+
327+
[role="exclude",id="audit-event-types"]
328+
=== Audit event types
329+
330+
This page has moved.
331+
//See {ref}/audit-event-types.html[Audit event types].
332+
333+
[role="exclude",id="audit-log-output"]
334+
=== Logfile audit output
335+
336+
[[audit-log-ignore-policy]]
337+
This page has moved.
338+
//See {ref}/audit-log-output.html[Logfile audit output].
339+
340+
[role="exclude",id="auditing-search-queries"]
341+
=== Auditing search queries
342+
343+
This page has moved.
344+
//See {ref}/auditing-search-queries.html[Auditing search queries].
345+
346+
[role="exclude",id="encrypting-communications"]
347+
=== Encrypting communications
348+
349+
This page has moved.
350+
//See {ref}/encrypting-communications.html[Encrypting communications].
351+
352+
[role="exclude",id="ssl-tls"]
353+
=== Setting up TLS on a cluster
354+
355+
This page has moved.
356+
//See {ref}/ssl-tls.html[Setting up TLS on a cluster].
357+
358+
[role="exclude",id="ciphers"]
359+
=== Enabling cipher suites for stronger encryption
360+
361+
This page has moved.
362+
See {ref}/ciphers.html[Enabling cipher suites for stronger encryption].
363+
364+
[role="exclude",id="ip-filtering"]
365+
=== Restricting connections with IP filtering
366+
367+
This page has moved.
368+
//See {ref}/ip-filtering.html[Restricting connections with IP filtering].
369+
370+
[role="exclude",id="ccs-clients-integrations"]
371+
=== Cross cluster search, clients, and integrations
372+
373+
This page has moved.
374+
//See {ref}/ccs-clients-integrations.html[Cross cluster search, clients, and integrations].
375+
376+
[role="exclude",id="cross-cluster-configuring"]
377+
=== Cross cluster search and security
378+
379+
This page has moved.
380+
//See {ref}/cross-cluster-configuring.html[Cross cluster search and security].
381+
382+
[role="exclude",id="java-clients"]
383+
=== Java Client and security
384+
385+
[[transport-client]]
386+
This page has moved.
387+
//See {ref}/java-clients.html[Java Client and security].
388+
389+
[role="exclude",id="http-clients"]
390+
=== HTTP/REST clients and security
391+
392+
This page has moved.
393+
//See {ref}/http-clients.html[].
394+
395+
[role="exclude",id="hadoop"]
396+
=== ES-Hadoop and Security
397+
398+
This page has moved.
399+
//See {ref}/hadoop.html[].
400+
401+
[role="exclude",id="beats"]
402+
=== Beats and Security
403+
404+
See:
405+
406+
* {auditbeat-ref}/securing-beats.html[{auditbeat}]
407+
* {filebeat-ref}/securing-beats.html[{filebeat}]
408+
* {heartbeat-ref}/securing-beats.html[{heartbeat}]
409+
* {metricbeat-ref}/securing-beats.html[{metricbeat}]
410+
* {packetbeat-ref}/securing-beats.html[{packetbeat}]
411+
* {winlogbeat-ref}/securing-beats.html[{winlogbeat}]
412+
413+
[role="exclude",id="secure-monitoring"]
414+
=== Monitoring and security
415+
416+
This page has moved.
417+
//See {ref}/secure-monitoring.html[Monitoring and security].
418+
419+
[role="exclude",id="separating-node-client-traffic"]
420+
=== Separating node-to-node and client traffic
421+
422+
This page has moved.
423+
See {ref}/separating-node-client-traffic.html[Separating node-to-node and client traffic].
424+
425+
[role="exclude",id="custom-realms"]
426+
=== Integrating with other authentication systems
427+
428+
This page has moved.
429+
//See {ref}/custom-realms.html[Integrating with other authentication systems].
430+
431+
[role="exclude",id="anonymous-access"]
432+
=== Enabling anonymous access
433+
434+
This page has moved.
435+
//See {ref}/anonymous-access.html[Enabling anonymous access].
436+
437+
[role="exclude",id="controlling-user-cache"]
438+
=== Controlling the user cache
439+
440+
This page has moved.
441+
//See {ref}/controlling-user-cache.html[Controlling the user cache].
442+
443+
[role="exclude",id="saml-guide"]
444+
=== Configuring SAML single-sign-on on the {stack}
445+
446+
This page has moved.
447+
//See {ref}/saml-guide.html[Configuring SAML SSO on the {stack}].
448+
449+
[role="exclude",id="saml-kibana"]
450+
=== Configuring Kibana
451+
452+
[[saml-kibana-basic]]
453+
This page has moved.
454+
//See {ref}/saml-kibana.html[Configuring Kibana].
455+
456+
[role="exclude",id="defining-roles"]
457+
=== Defining roles
458+
459+
[[roles-application-priv]]
460+
This
461+
[[roles-management-file]]
462+
page has moved.
463+
464+
[role="exclude",id="securing-aliases"]
465+
=== Granting privileges for indices and aliases
466+
467+
This page has moved.
468+
469+
[role="exclude",id="mapping-roles"]
470+
=== Mapping users and groups to roles
471+
472+
[[mapping-roles-file]]
473+
This
474+
[[ldap-role-mapping]]
475+
page has moved.
476+
477+
[role="exclude",id="field-and-document-access-control"]
478+
=== Setting up field and document level security
479+
480+
This page has moved.
481+
482+
[role="exclude",id="run-as-privilege"]
483+
=== Submitting requests on behalf of other users
484+
485+
This page has moved.
486+
487+
[role="exclude",id="saml-guide-authentication"]
488+
=== Configure {es} for SAML authentication
489+
490+
[[saml-attribute-mapping]]
491+
This
492+
[[saml-create-realm]]
493+
page
494+
[[saml-enc-sign]]
495+
has
496+
[[saml-logout]]
497+
moved
498+
[[req-authn-context]]
499+
.
500+
501+
[role="exclude",id="saml-guide-idp"]
502+
=== The identity provider
503+
504+
This page has moved.
505+
506+
[role="exclude",id="saml-role-mapping"]
507+
=== Configuring role mappings
508+
509+
This page has moved.
510+
511+
[role="exclude",id="custom-roles-provider"]
512+
=== Custom roles provider extension
513+
514+
This page has moved.

docs/en/stack/security/authentication/active-directory-realm.asciidoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,10 @@ properties are populated in the user's _metadata_:
6666

6767
This metadata is returned in the
6868
{ref}/security-api-authenticate.html[authenticate API] and can be used with
69-
<<templating-role-query, templated queries>> in roles.
69+
//TEMPORARILY OMIT:<<templating-role-query,
70+
templated queries
71+
//>>
72+
in roles.
7073

7174
Additional metadata can be extracted from the Active Directory server by configuring
7275
the `metadata` setting on the Active Directory realm.

docs/en/stack/security/authentication/index.asciidoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ include::pki-realm.asciidoc[]
1212
include::saml-realm.asciidoc[]
1313
include::kerberos-realm.asciidoc[]
1414

15-
include::{xes-repo-dir}/security/authentication/custom-realm.asciidoc[]
15+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/authentication/custom-realm.asciidoc[]
1616

17-
include::{xes-repo-dir}/security/authentication/anonymous-access.asciidoc[]
17+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/authentication/anonymous-access.asciidoc[]
1818

19-
include::{xes-repo-dir}/security/authentication/user-cache.asciidoc[]
19+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/authentication/user-cache.asciidoc[]
2020

21-
include::{xes-repo-dir}/security/authentication/saml-guide.asciidoc[]
21+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/authentication/saml-guide.asciidoc[]

docs/en/stack/security/authentication/ldap-realm.asciidoc

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,12 +73,22 @@ populated in the user's _metadata_:
7373

7474
This metadata is returned in the
7575
{ref}/security-api-authenticate.html[authenticate API], and can be used with
76-
<<templating-role-query, templated queries>> in roles.
76+
//TEMPORARILY OMIT:<<templating-role-query,
77+
templated queries
78+
//>>
79+
in roles.
7780

7881
Additional fields can be included in the user's metadata by configuring
7982
the `metadata` setting on the LDAP realm. This metadata is available for use
80-
with the <<mapping-roles-api, role mapping API>> or in
81-
<<templating-role-query, templated role queries>>.
83+
with the
84+
//TEMPORARILY OMIT:<<mapping-roles-api,
85+
role mapping API
86+
//>>
87+
or in
88+
//TEMPORARILY OMIT:<<templating-role-query,
89+
templated role queries
90+
//>>
91+
.
8292

8393
[[ldap-ssl]]
8494
==== Setting up SSL Between Elasticsearch and LDAP

docs/en/stack/security/authorization/index.asciidoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,20 +3,20 @@ include::overview.asciidoc[]
33

44
include::built-in-roles.asciidoc[]
55

6-
include::{xes-repo-dir}/security/authorization/managing-roles.asciidoc[]
6+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/authorization/managing-roles.asciidoc[]
77

88
include::privileges.asciidoc[]
99

1010
include::document-level-security.asciidoc[]
1111

1212
include::field-level-security.asciidoc[]
1313

14-
include::{xes-repo-dir}/security/authorization/alias-privileges.asciidoc[]
14+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/authorization/alias-privileges.asciidoc[]
1515

16-
include::{xes-repo-dir}/security/authorization/mapping-roles.asciidoc[]
16+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/authorization/mapping-roles.asciidoc[]
1717

18-
include::{xes-repo-dir}/security/authorization/field-and-document-access-control.asciidoc[]
18+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/authorization/field-and-document-access-control.asciidoc[]
1919

20-
include::{xes-repo-dir}/security/authorization/run-as-privilege.asciidoc[]
20+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/authorization/run-as-privilege.asciidoc[]
2121

22-
include::{xes-repo-dir}/security/authorization/custom-roles-provider.asciidoc[]
22+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/authorization/custom-roles-provider.asciidoc[]

docs/en/stack/security/get-started-security.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -352,7 +352,7 @@ Logstash and {es}.
352352
* <<beats,Configuring security in the Beats>>. Configure authentication
353353
credentials and encrypt connections to {es}.
354354

355-
* <<java-clients,Configuring the Java transport client to use encrypted communications>>.
355+
* Configuring the Java transport client to use encrypted communications.
356356

357357
* {hadoop-ref}/security.html[Configuring {es} for Apache Hadoop to use secured transport].
358358

docs/en/stack/security/index.asciidoc

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,9 @@ A critical part of security is keeping confidential data confidential.
5353
Elasticsearch has built-in protections against accidental data loss and
5454
corruption. However, there's nothing to stop deliberate tampering or data
5555
interception. The {stack-security-features} preserve the integrity of your
56-
data by <<ssl-tls, encrypting communications>> to and from nodes. For even
57-
greater protection, you can increase the <<ciphers, encryption strength>> and
58-
<<separating-node-client-traffic, separate client traffic from node-to-node communications>>.
56+
data by <<ssl-tls, encrypting communications>> to and from nodes.
57+
//For even greater protection, you can increase the <<ciphers, encryption strength>> and
58+
//<<separating-node-client-traffic, separate client traffic from node-to-node communications>>.
5959

6060

6161
[float]
@@ -79,9 +79,11 @@ operational issues.
7979
provides more information about how Security supports user authentication,
8080
authorization, and encryption.
8181

82+
////
8283
* <<ccs-tribe-clients-integrations>>
8384
shows you how to interact with an Elasticsearch cluster protected by the
8485
{stack-security-features}.
86+
////
8587

8688
[float]
8789
=== Have Comments, Questions, or Feedback?
@@ -96,13 +98,13 @@ include::authentication/index.asciidoc[]
9698

9799
include::authorization/index.asciidoc[]
98100

99-
include::{xes-repo-dir}/security/auditing/index.asciidoc[]
101+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/auditing/index.asciidoc[]
100102

101-
include::{xes-repo-dir}/security/securing-communications.asciidoc[]
103+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/securing-communications.asciidoc[]
102104

103-
include::{xes-repo-dir}/security/using-ip-filtering.asciidoc[]
105+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/using-ip-filtering.asciidoc[]
104106

105-
include::{xes-repo-dir}/security/tribe-clients-integrations.asciidoc[]
107+
//TEMPORARILY OMIT:include::{xes-repo-dir}/security/tribe-clients-integrations.asciidoc[]
106108

107109
include::get-started-security.asciidoc[]
108110

0 commit comments

Comments
 (0)