@@ -147,7 +147,64 @@ used.
147
147
TLS version 1.0 is now disabled by default as it suffers from
148
148
https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet#Rule_-_Only_Support_Strong_Protocols[known security issues].
149
149
The default protocols are now TLSv1.3 (if supported), TLSv1.2 and TLSv1.1.
150
- You can enable TLS v1.0 by configuring the relevant `ssl.supported_protocols` setting to include `"TLSv1"`, for example:
150
+
151
+ You can enable TLS v1.0 by configuring the relevant `ssl.supported_protocols`
152
+ setting to include `"TLSv1"`.
153
+ Depending on your local configuration and the TLS protocols that are in use
154
+ on your network, you may need to enable TLS v1.0 support in any or all of the
155
+ following places:
156
+
157
+ `xpack.security.http.ssl.supported_protocols`::
158
+ For incoming HTTP connections to Elasticsearch's HTTP (Rest) interface.
159
+ If there are clients that connect to {es} and do not support newer TLS versions,
160
+ you must update this setting.
161
+
162
+ `xpack.http.ssl.supported_protocols`::
163
+ For outgoing HTTP connections from {watcher}.
164
+ If you have watches that connect to external HTTP servers and do not support
165
+ newer TLS versions, you must update this setting.
166
+
167
+ `xpack.security.authc.realms.ldap.{name}.ssl.supported_protocols`::
168
+ For outgoing LDAP connections from {es} {security-features}.
169
+ If you have an LDAP realm enabled and the LDAP directory to which that realm
170
+ connects does not support newer TLS versions, you must update this setting.
171
+
172
+ `xpack.security.authc.realms.active_directory.{name}.ssl.supported_protocols`::
173
+ For outgoing Active Directory (LDAP) connections from {es} {security-features}.
174
+ If you have an AD realm enabled and the directory server to which that realm
175
+ connects does not support newer TLS versions, you must update this setting.
176
+
177
+ `xpack.security.authc.realms.saml.{name}.ssl.supported_protocols`::
178
+ For outgoing HTTP connections to retrieve SAML metadata.
179
+ If you have a SAML realm enabled and the realm is configured to retrieve
180
+ metadata over HTTPS (that is, `idp.metadata.path` is a URL starting with
181
+ `https://`) and the web server which hosts the metadata does not support newer
182
+ TLS versions, you must update this setting.
183
+
184
+ `xpack.security.authc.realms.oidc.{name}.ssl.supported_protocols`::
185
+ For outgoing HTTP connections to an OpenId Connect Provider.
186
+ If you have an OpenId Connect ("oidc") realm enabled and the realm is configured
187
+ to connect to a remote OpenID Connect Provider which does not support newer TLS
188
+ versions, you must update this setting.
189
+
190
+ `xpack.monitoring.exporters.{name}.ssl.supported_protocols`::
191
+ For remote monitoring data.
192
+ If your monitoring data is exported to a remote monitoring cluster and that
193
+ cluster is configured to only support TLSv1, you must update this setting.
194
+
195
+ `reindex.ssl.supported_protocols`::
196
+ For reindex from remote.
197
+ If you reindex data from a remote {es} cluster which has SSL enabled on the
198
+ `http` interface and that cluster is configured to only support TLSv1, you must
199
+ update this setting.
200
+
201
+ `xpack.security.transport.ssl.supported_protocols`::
202
+ For incoming connections between {es} nodes. If you have specialized network
203
+ equipment which inspects TLS packets between your nodes, and that equipment
204
+ enforces TLSv1 you must update this setting.
205
+
206
+
207
+ The following is an example that enables TLS v1.0 for incoming HTTP connections:
151
208
[source,yaml]
152
209
--------------------------------------------------
153
210
xpack.security.http.ssl.supported_protocols: [ "TLSv1.3", "TLSv1.2", "TLSv1.1", "TLSv1" ]
0 commit comments