|
2 | 2 | [[realms]]
|
3 | 3 | === Realms
|
4 | 4 |
|
5 |
| -Authentication in {security} is handled by one or more authentication services |
6 |
| -called _realms_. A _realm_ is used to resolve and authenticate users based on |
7 |
| -authentication tokens. {security} provides the following built-in realms: |
| 5 | +The {stack-security-features} authenticate users by using realms and one or more |
| 6 | +<<token-authentication-services,token-based authentication services>>. |
| 7 | + |
| 8 | +A _realm_ is used to resolve and authenticate users based on authentication |
| 9 | +tokens. The {security-features} provide the following built-in realms: |
8 | 10 |
|
9 | 11 | _native_::
|
10 | 12 | An internal realm where users are stored in a dedicated {es} index.
|
11 | 13 | This realm supports an authentication token in the form of username and password,
|
12 | 14 | and is available by default when no realms are explicitly configured. The users
|
13 |
| -are managed via the {ref}/security-api.html#security-user-apis[user management APIs]. |
| 15 | +are managed via the {ref}/security-api.html#security-user-apis[user management APIs]. |
14 | 16 | See <<native-realm>>.
|
15 | 17 |
|
16 | 18 | _ldap_::
|
@@ -43,23 +45,23 @@ _kerberos_::
|
43 | 45 | A realm that authenticates a user using Kerberos authentication. Users are
|
44 | 46 | authenticated on the basis of Kerberos tickets. See <<kerberos-realm>>.
|
45 | 47 |
|
46 |
| -{security} also supports custom realms. If you need to integrate with another |
47 |
| -authentication system, you can build a custom realm plugin. For more information, |
48 |
| -see <<custom-realms, Integrating with Other Authentication Systems>>. |
| 48 | +The {security-features} also support custom realms. If you need to integrate |
| 49 | +with another authentication system, you can build a custom realm plugin. For |
| 50 | +more information, see <<custom-realms>>. |
49 | 51 |
|
50 | 52 | ==== Internal and external realms
|
51 | 53 |
|
52 | 54 | Realm types can roughly be classified in two categories:
|
53 | 55 |
|
54 | 56 | Internal:: Realms that are internal to Elasticsearch and don't require any
|
55 |
| - communication with external parties. They are fully managed by |
56 |
| - {security}. There can only be a maximum of one configured realm |
57 |
| - per internal realm type. {security} provides two internal realm |
| 57 | + communication with external parties. They are fully managed by the |
| 58 | + {security-features}. There can only be a maximum of one configured |
| 59 | + realm per internal realm type. {security} provides two internal realm |
58 | 60 | types: `native` and `file`.
|
59 | 61 |
|
60 | 62 | External:: Realms that require interaction with parties/components external to
|
61 | 63 | {es}, typically, with enterprise grade identity management
|
62 | 64 | systems. Unlike internal realms, there can be as many external realms
|
63 | 65 | as one would like - each with its own unique name and configuration.
|
64 |
| - {security} provides the following external realm types: `ldap`, |
65 |
| - `active_directory`, `saml`, `kerberos` and `pki`. |
| 66 | + The {security-features} provide the following external realm types: |
| 67 | + `ldap`, `active_directory`, `saml`, `kerberos` and `pki`. |
0 commit comments