Skip to content

Commit 041c920

Browse files
authored
[DOCS] Refreshes security tutorial
2 parents a7eea78 + cefbb2b commit 041c920

13 files changed

+20
-19
lines changed

docs/en/stack/get-started-trial.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ For more information about Elastic license levels, see
99
https://www.elastic.co/subscriptions.
1010

1111
You can start a 30-day trial to try out all of the platinum features, including
12-
{security} and {ml}. Click **Start trial** on the **License Management** page in
13-
{kib}.
12+
{security-features} and {ml-features}. Click **Start trial** on the
13+
**License Management** page in {kib}.
1414

1515
IMPORTANT: If your cluster has already activated a trial license for the current
1616
major version, you cannot start a new trial. For example, if you have already

docs/en/stack/security/get-started-builtin-users.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
There are <<built-in-users,built-in users>> that you can use for specific administrative purposes:
2-
`elastic`, `kibana`, `logstash_system`, `apm_system`, `beats_system`, and
3-
`remote_monitoring_user`.
1+
There are <<built-in-users,built-in users>> that you can use for specific
2+
administrative purposes: `apm_system`, `beats_system`, `elastic`, `kibana`,
3+
`logstash_system`, and `remote_monitoring_user`.
44

55
Before you can use them, you must set their passwords:
66

docs/en/stack/security/get-started-enable-security.asciidoc

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
1-
When you use the trial license, {security} is disabled by default. To enable it:
1+
When you use the trial license, the {es} {security-features} are disabled by
2+
default. To enable them:
23

34
. Stop {kib}. The method for starting and stopping {kib} varies depending on
45
how you installed it. For example, if you installed {kib} from an archive
@@ -29,11 +30,11 @@ xpack.security.enabled: true
2930
TIP: If you have a basic or trial license, the default value for this setting is
3031
`false`. If you have a gold or higher license, the default value is `true`.
3132
Therefore, it is a good idea to explicitly add this setting to avoid confusion
32-
about whether {security} is enabled.
33+
about whether {security-features} are enabled.
3334

3435
--
3536

36-
When you enable {security}, basic authentication is enabled by default. To
37-
communicate with the cluster, you must specify a username and password.
38-
Unless you <<anonymous-access,enable anonymous access>>, all requests that don't
39-
include a user name and password are rejected.
37+
When you enable {es} {security-features}, basic authentication is enabled by
38+
default. To communicate with the cluster, you must specify a username and
39+
password. Unless you <<anonymous-access,enable anonymous access>>, all requests
40+
that don't include a user name and password are rejected.

docs/en/stack/security/get-started-kibana-users.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
When {security} is enabled, users must log in to {kib} with a valid user ID and
2-
password.
1+
When the {es} {security-features} are enabled, users must log in to {kib}
2+
with a valid user ID and password.
33

44
{kib} also performs some tasks under the covers that require use of the
55
built-in `kibana` user.

docs/en/stack/security/get-started-security.asciidoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -71,9 +71,9 @@ manage all the other users.
7171

7272
The {stack} _authenticates_ users to ensure that they are valid. The
7373
authentication process is handled by _realms_. You can use one or more built-in
74-
realms, such as the native, file, LDAP, PKI, Active Directory, or SAML realms.
75-
Alternatively, you can create your own custom realms. In this tutorial, we'll
76-
use a native realm.
74+
realms, such as the native, file, LDAP, PKI, Active Directory, SAML, or Kerberos
75+
realms. Alternatively, you can create your own custom realms. In this tutorial,
76+
we'll use a native realm.
7777

7878
In general, you configure realms by adding `xpack.security.authc.realms`
7979
settings in the `elasticsearch.yml` file. However, the native realm is available
@@ -98,10 +98,10 @@ Let's create two users in the native realm.
9898
[role="screenshot"]
9999
image::security/images/management-builtin-users.jpg["User management screenshot in Kibana"]
100100

101-
In this example, you can see all of the built-in users.
101+
In this example, you can see a list of built-in users.
102102
--
103103

104-
. Click *Create user* to make a new user. For example, create a user for yourself:
104+
. Click *Create new user*. For example, create a user for yourself:
105105
+
106106
--
107107
[role="screenshot"]
@@ -111,7 +111,7 @@ You'll notice that when you create a user, you can assign it a role. Don't
111111
choose a role yet--we'll come back to that in subsequent steps.
112112
--
113113

114-
. Click *Create user* and create a `logstash_internal` user.
114+
. Click *Create new user* and create a `logstash_internal` user.
115115
+
116116
--
117117
In {stack-gs}/get-started-elastic-stack.html[Geting started with the {stack}],
34 KB
Loading
26.1 KB
Loading
36.6 KB
Loading
30.9 KB
Loading
44.7 KB
Loading

0 commit comments

Comments
 (0)