Skip to content

Commit dd22ea6

Browse files
authored
[DOCS] Adds missing references to oidc realms (#48224)
1 parent 9d505dc commit dd22ea6

File tree

3 files changed

+7
-4
lines changed

3 files changed

+7
-4
lines changed

x-pack/docs/en/security/authentication/oidc-guide.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ the authentication chain for {es}.
8585

8686
This realm has a few mandatory settings, and a number of optional settings.
8787
The available settings are described in detail in
88-
<<ref-oidc-settings. This
88+
<<ref-oidc-settings>>. This
8989
guide will explore the most common settings.
9090

9191
Create an OpenID Connect (the realm type is `oidc`) realm in your `elasticsearch.yml` file

x-pack/docs/en/security/authentication/overview.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ integrate with external user management systems such as LDAP and Active
1616
Directory.
1717

1818
The {stack-security-features} provide built-in realms such as `native`,`ldap`,
19-
`active_directory`, `pki`, `file`, and `saml`. If none of the built-in realms
20-
meet your needs, you can also build your own custom realm and plug it into the
21-
{stack}.
19+
`active_directory`, `pki`, `file`, `saml`, and `oidc`. If none of the built-in
20+
realms meet your needs, you can also build your own custom realm and plug it
21+
into the {stack}.
2222

2323
When {security-features} are enabled, depending on the realms you've configured,
2424
you must attach your user credentials to the requests sent to {es}. For example,

x-pack/docs/en/security/authentication/realms.asciidoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,9 @@ _kerberos_::
4545
A realm that authenticates a user using Kerberos authentication. Users are
4646
authenticated on the basis of Kerberos tickets. See <<kerberos-realm>>.
4747

48+
_oidc_::
49+
A realm that facilitates authentication using OpenID Connect. It enables {es} to serve as an OpenID Connect Relying Party (RP) and provide single sign-on (SSO) support in {kib}. See <<oidc-guide>>.
50+
4851
The {security-features} also support custom realms. If you need to integrate
4952
with another authentication system, you can build a custom realm plugin. For
5053
more information, see <<custom-realms>>.

0 commit comments

Comments
 (0)