|
1 | | -[role="xpack"] |
2 | | -[[configuring-pki-realm]] |
3 | | -=== Configuring a PKI realm |
4 | | - |
5 | | -You can configure {es} to use Public Key Infrastructure (PKI) certificates to |
6 | | -authenticate users. This requires clients connecting directly to {es} to |
7 | | -present X.509 certificates. The certificates must first be accepted for |
8 | | -authentication on the SSL/TLS layer on {es}. Only then they are optionally |
9 | | -further validated by a PKI realm. |
10 | | - |
11 | | -Users may also use PKI certificates to authenticate to {kib}, however this |
12 | | -requires some <<pki-realm-for-proxied-clients,additional configuration>>. On |
13 | | -{es}, this configuration enables {kib} to act as a proxy for SSL/TLS |
14 | | -authentication and to submit the client certificates to {es} for further |
15 | | -validation by a PKI realm. |
16 | | - |
17 | | -For more general information, see <<pki-realm>>. |
18 | | - |
19 | | -[float] |
20 | | -[role="xpack"] |
21 | 1 | [[pki-realm-for-direct-clients]] |
22 | 2 | ==== PKI authentication for clients connecting directly to {es} |
23 | 3 |
|
24 | 4 | To use PKI in {es}, you configure a PKI realm, enable client authentication on |
25 | | -the desired network layers (transport or http), and map the Distinguished Name |
26 | | -(DN) from the Subject field in the user certificate to roles by using the |
27 | | -<<security-api-role-mapping,role-mapping API>> or the role-mapping file. |
| 5 | +the desired network layers (transport or http), and map the Distinguished Names |
| 6 | +(DNs) from the Subject field in the user certificates to roles. You create the mappings in a role mapping file or use the role mappings API. |
| 7 | + |
| 8 | +If you want the same users to also be authenticated using certificates when they connect to {kib}, you must configure the {es} PKI realm to |
| 9 | +<<pki-realm-for-proxied-clients,allow delegation>> and to |
| 10 | +{kibana-ref}/kibana-authentication.html#pki-authentication[enable PKI authentication in {kib}]. |
28 | 11 |
|
29 | 12 | You can also use a combination of PKI and username/password authentication. For |
30 | 13 | example, you can enable SSL/TLS on the transport layer and define a PKI realm to |
@@ -214,8 +197,6 @@ alternative to role mapping. |
214 | 197 |
|
215 | 198 | -- |
216 | 199 |
|
217 | | -[float] |
218 | | -[role="xpack"] |
219 | 200 | [[pki-realm-for-proxied-clients]] |
220 | 201 | ==== PKI authentication for clients connecting to {kib} |
221 | 202 |
|
@@ -285,4 +266,3 @@ PUT /_security/role_mapping/direct_pki_only |
285 | 266 | -------------------------------------------------- |
286 | 267 | <1> only when this metadata field is set (it is *not* `null`) the user has been |
287 | 268 | authenticated in the delegation scenario. |
288 | | - |
0 commit comments