Skip to content

Commit abd4a70

Browse files
committed
[DOCS] Merges duplicate pages for Kerberos realms (elastic#49207)
1 parent b4f82c9 commit abd4a70

File tree

4 files changed

+20
-17
lines changed

4 files changed

+20
-17
lines changed

docs/reference/redirects.asciidoc

+6
Original file line numberDiff line numberDiff line change
@@ -969,3 +969,9 @@ See <<ref-ldap-settings>>.
969969
=== Setting up SSL between Elasticsearch and LDAP
970970

971971
See <<tls-ldap>>.
972+
973+
[role="exclude",id="configuring-kerberos-realm"]
974+
=== Configuring a Kerberos realm
975+
976+
See <<kerberos-realm-configuration>>.
977+

x-pack/docs/en/security/authentication/configuring-kerberos-realm.asciidoc

+4-9
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
[role="xpack"]
2-
[[configuring-kerberos-realm]]
3-
=== Configuring a Kerberos realm
4-
51
Kerberos is used to protect services and uses a ticket-based authentication
62
protocol to authenticate users.
73
You can configure {es} to use the Kerberos V5 authentication protocol, which is
@@ -15,9 +11,8 @@ Refer to your Kerberos installation documentation for more information about
1511
obtaining TGT. {es} clients must first obtain a TGT then initiate the process of
1612
authenticating with {es}.
1713

18-
For a summary of Kerberos terminology, see <<kerberos-realm>>.
19-
20-
==== Before you begin
14+
[[kerberos-realm-prereq]]
15+
===== Before you begin
2116

2217
. Deploy Kerberos.
2318
+
@@ -51,7 +46,8 @@ For more information on Java GSS, see
5146
https://docs.oracle.com/javase/10/security/kerberos-requirements1.htm[Java GSS Kerberos requirements]
5247
--
5348

54-
==== Create a Kerberos realm
49+
[[kerberos-realm-create]]
50+
===== Create a Kerberos realm
5551

5652
To configure a Kerberos realm in {es}:
5753

@@ -176,4 +172,3 @@ NOTE: The Kerberos realm supports
176172
alternative to role mapping.
177173

178174
--
179-

x-pack/docs/en/security/authentication/kerberos-realm.asciidoc

+9-6
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,9 @@ authentication, an industry standard protocol to authenticate users in {es}.
77

88
NOTE: You cannot use the Kerberos realm to authenticate on the transport network layer.
99

10-
To authenticate users with Kerberos, you need to
11-
{ref}/configuring-kerberos-realm.html[configure a Kerberos realm] and
12-
<<mapping-roles, map users to roles>>.
13-
For more information on realm settings, see
14-
{ref}/security-settings.html#ref-kerberos-settings[Kerberos realm settings].
10+
To authenticate users with Kerberos, you need to configure a Kerberos realm and
11+
map users to roles. For more information on realm settings, see
12+
<<ref-kerberos-settings>>.
1513

1614
[[kerberos-terms]]
1715
==== Key concepts
@@ -59,4 +57,9 @@ realm session key encryption types.
5957

6058
_ticket granting ticket (TGT)_::
6159
A TGT is an authentication ticket generated by the Kerberos authentication
62-
server. It contains an encrypted authenticator.
60+
server. It contains an encrypted authenticator.
61+
62+
[[kerberos-realm-configuration]]
63+
==== Configuring a Kerberos realm
64+
65+
include::configuring-kerberos-realm.asciidoc[]

x-pack/docs/en/security/configuring-es.asciidoc

+1-2
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ your subscription. For more information, see https://www.elastic.co/subscription
7474
--
7575
** <<configuring-ad-realm,Active Directory realms>>
7676
** <<file-realm,File realms>>
77-
** <<configuring-kerberos-realm,Kerberos realms>>
77+
** <<kerberos-realm,Kerberos realms>>
7878
** <<ldap-realm,LDAP realms>>
7979
** <<native-realm,Native realms>>
8080
** <<configuring-pki-realm,PKI realms>>
@@ -147,7 +147,6 @@ include::securing-communications/separating-node-client-traffic.asciidoc[]
147147

148148
include::authentication/configuring-active-directory-realm.asciidoc[]
149149
include::authentication/configuring-pki-realm.asciidoc[]
150-
include::authentication/configuring-kerberos-realm.asciidoc[]
151150

152151
include::reference/files.asciidoc[]
153152
include::fips-140-compliance.asciidoc[]

0 commit comments

Comments
 (0)