|
2 | 2 | [[realms]] |
3 | 3 | === Realms |
4 | 4 |
|
5 | | -Authentication in {security} is handled by one or more authentication services |
6 | | -called _realms_. A _realm_ is used to resolve and authenticate users based on |
7 | | -authentication tokens. {security} provides the following built-in realms: |
| 5 | +The {stack-security-features} authenticate users by using realms and one or more |
| 6 | +<<token-authentication-services,token-based authentication services>>. |
| 7 | + |
| 8 | +A _realm_ is used to resolve and authenticate users based on authentication |
| 9 | +tokens. The {security-features} provide the following built-in realms: |
8 | 10 |
|
9 | 11 | _native_:: |
10 | 12 | An internal realm where users are stored in a dedicated {es} index. |
11 | 13 | This realm supports an authentication token in the form of username and password, |
12 | 14 | and is available by default when no realms are explicitly configured. The users |
13 | | -are managed via the {ref}/security-api.html#security-user-apis[user management APIs]. |
| 15 | +are managed via the {ref}/security-api.html#security-user-apis[user management APIs]. |
14 | 16 | See <<native-realm>>. |
15 | 17 |
|
16 | 18 | _ldap_:: |
@@ -43,23 +45,23 @@ _kerberos_:: |
43 | 45 | A realm that authenticates a user using Kerberos authentication. Users are |
44 | 46 | authenticated on the basis of Kerberos tickets. See <<kerberos-realm>>. |
45 | 47 |
|
46 | | -{security} also supports custom realms. If you need to integrate with another |
47 | | -authentication system, you can build a custom realm plugin. For more information, |
48 | | -see <<custom-realms, Integrating with Other Authentication Systems>>. |
| 48 | +The {security-features} also support custom realms. If you need to integrate |
| 49 | +with another authentication system, you can build a custom realm plugin. For |
| 50 | +more information, see <<custom-realms>>. |
49 | 51 |
|
50 | 52 | ==== Internal and external realms |
51 | 53 |
|
52 | 54 | Realm types can roughly be classified in two categories: |
53 | 55 |
|
54 | 56 | Internal:: Realms that are internal to Elasticsearch and don't require any |
55 | | - communication with external parties. They are fully managed by |
56 | | - {security}. There can only be a maximum of one configured realm |
57 | | - per internal realm type. {security} provides two internal realm |
| 57 | + communication with external parties. They are fully managed by the |
| 58 | + {security-features}. There can only be a maximum of one configured |
| 59 | + realm per internal realm type. {security} provides two internal realm |
58 | 60 | types: `native` and `file`. |
59 | 61 |
|
60 | 62 | External:: Realms that require interaction with parties/components external to |
61 | 63 | {es}, typically, with enterprise grade identity management |
62 | 64 | systems. Unlike internal realms, there can be as many external realms |
63 | 65 | as one would like - each with its own unique name and configuration. |
64 | | - {security} provides the following external realm types: `ldap`, |
65 | | - `active_directory`, `saml`, `kerberos` and `pki`. |
| 66 | + The {security-features} provide the following external realm types: |
| 67 | + `ldap`, `active_directory`, `saml`, `kerberos` and `pki`. |
0 commit comments