You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Call out the fact that the SSL Configuration is important and
offer a minimal example of configuring a custom CA for trust.
- Add information about the `op.issuer` that was missing and add
information about the `rp.post_logout_redirect` in the example
since `op.endsession_endpoint` was already mentioned there and
these two should be together
- Explain that `op.jwkset_path` can be a URL.
@@ -369,6 +381,30 @@ will trigger re-authentication of the user. For instance, when using OpenID Conn
369
381
single sign-on to {kib}, this could be set to +$\{kibana-url}/logged_out+, which will show a user-
370
382
friendly message to the user.
371
383
384
+
[[oidc-ssl-config]]
385
+
==== OpenID Connect Realm SSL Configuration
386
+
387
+
OpenID Connect depends on TLS to provide security properties such as encryption in transit and endpoint authentication. The RP
388
+
is required to establish back-channel communication with the OP in order to exchange the code for an ID Token during the
389
+
Authorization code grant flow and in order to get additional user information from the UserInfo endpoint. Furthermore, if
390
+
you configure `op.jwks_path` as a URL, {es} will need to get the OP's signing keys from the file hosted there. As such, it is
391
+
important that {es} can validate and trust the server certificate that the OP uses for TLS. Since the system truststore is
392
+
used for the client context of outgoing https connections, if your OP is using a certificate from a trusted CA, no additional
393
+
configuration is needed.
394
+
395
+
However, if the issuer of your OP's certificate is not trusted by the JVM on which {es} is running (e.g it uses a organization CA), then you must configure
396
+
{es} to trust that CA. Assuming that you have the CA certificate that has signed the certificate that the OP uses for TLS
397
+
stored in the /oidc/company-ca.pem` file stored in the configuration directory of {es}, you need to set the following
0 commit comments