You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
.ServerCertificateValidationCallback(CertificateValidations.DenyAll);// <1> synonymous with the previous lambda expression
61
+
.ServerCertificateValidationCallback(CertificateValidations.DenyAll);// <1> use a lambda expression or `CertificateValidations.DenyAll` to deny all validation
.ServerCertificateValidationCallback(CertificateValidations.AllowAll);// <1> use a lambda expression or `CertificateValidations.AllowAll` to allow all validation
92
90
}
93
91
/**
94
92
* This is not recommended in production.
@@ -111,7 +109,7 @@ public AllowAllSslCertificatesApiTests(AllowAllCertificatesCluster cluster, Endp
111
109
* If your client application has access to the public CA certificate locally, Elasticsearch.NET and NEST ship with some handy helpers
112
110
* that can assert that a certificate the server presents is one that came from the local CA.
113
111
*
114
-
* If you use X-Pack's {ref_current}/certutil.html[+elasticsearch-certutil+ tool] to generate SSL certificates, the generated node certificate
112
+
* If you use {ref_current}/certutil.html[+elasticsearch-certutil+ tool] to generate SSL certificates, the generated node certificate
115
113
* does not include the CA in the certificate chain, in order to cut down on SSL handshake size. In those case you can use
116
114
* `CertificateValidations.AuthorityIsRoot` and pass it your local copy of the CA public key to assert that
117
115
* the certificate the server presented was generated using it
* X-Pack also allows you to configure a {ref_current}/configuring-pki-realm.html[PKI realm] to enable user authentication
183
-
* through client certificates. The {ref_current}/certutil.html[+elasticsearch-certutil+ tool] included with X-Pack allows you to
184
-
* generate client certificates as well and assign the distinguished name (DN) of the
185
-
* certificate to a user with a certain role.
180
+
* Elastic Stack Security features allow you to configure a {ref_current}/configuring-pki-realm.html[PKI realm] to enable user authentication
181
+
* through client certificates. The {ref_current}/certutil.html[+elasticsearch-certutil+ tool] included with the default distribution
182
+
* allows you to generate client certificates as well and assign the distinguished name (DN) of the certificate to a user with a certain role.
186
183
*
187
-
* By default, the `elasticsearch-certutil` tool only generates a public certificate (`.cer`) and a private key `.key`. To authenticate with client certificates, you need to present both
188
-
* as one certificate. The easiest way to do this is to generate a `pfx` or `p12` file from the `.cer` and `.key`
189
-
* and attach these to requests using `new X509Certificate(pathToPfx)`.
184
+
* By default, the `elasticsearch-certutil` tool only generates a public certificate (`.cer`) and a private key `.key`.
185
+
* To authenticate with client certificates, you need to present both as one certificate. The easiest way to do this is to generate a `pfx`
186
+
* or `p12` file from the `.cer` and `.key` and attach these to requests using `new X509Certificate(pathToPfx)`.
190
187
*
191
188
* You can pass a client certificate on `ConnectionSettings` for *all* requests.
0 commit comments