2017-06-27 12:14:35 -04:00
|
|
|
|
[role="xpack"]
|
2017-04-06 20:34:23 -04:00
|
|
|
|
[[security-settings]]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
=== Security settings in {es}
|
2017-08-11 13:00:35 -04:00
|
|
|
|
++++
|
2018-04-27 15:40:05 -04:00
|
|
|
|
<titleabbrev>Security settings</titleabbrev>
|
2017-08-11 13:00:35 -04:00
|
|
|
|
++++
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2018-04-05 15:06:43 -04:00
|
|
|
|
By default, {security} is disabled when you have a basic or trial license. To
|
|
|
|
|
enable {security}, use the `xpack.security.enabled` setting.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
You configure `xpack.security` settings to
|
2017-06-26 15:50:12 -04:00
|
|
|
|
<<anonymous-access-settings, enable anonymous access>>
|
2017-04-06 20:34:23 -04:00
|
|
|
|
and perform message authentication,
|
2017-11-01 12:21:11 -04:00
|
|
|
|
<<field-document-security-settings, set up document and field level security>>,
|
2018-01-18 12:18:24 -05:00
|
|
|
|
<<realm-settings, configure realms>>,
|
|
|
|
|
<<ssl-tls-settings, encrypt communications with SSL>>, and
|
|
|
|
|
<<auditing-settings, audit security events>>.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
All of these settings can be added to the `elasticsearch.yml` configuration file,
|
|
|
|
|
with the exception of the secure settings, which you add to the {es} keystore.
|
|
|
|
|
For more information about creating and updating the {es} keystore, see
|
|
|
|
|
<<secure-settings>>.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[general-security-settings]]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
==== General security settings
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`xpack.security.enabled`::
|
2018-04-05 15:06:43 -04:00
|
|
|
|
Set to `true` to enable {security} on the node. +
|
2017-08-04 11:59:50 -04:00
|
|
|
|
+
|
2018-07-25 12:51:40 -04:00
|
|
|
|
--
|
2018-04-05 15:06:43 -04:00
|
|
|
|
If set to `false`, which is the default value for basic and trial licenses,
|
|
|
|
|
{security} is disabled. It also affects all {kib} instances that connect to this
|
|
|
|
|
{es} instance; you do not need to disable {security} in those `kibana.yml` files.
|
2018-04-27 15:40:05 -04:00
|
|
|
|
For more information about disabling {security} in specific {kib} instances, see {kibana-ref}/security-settings-kb.html[{kib} security settings].
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2018-07-25 12:51:40 -04:00
|
|
|
|
TIP: If you have gold or higher licenses, the default value is `true`; we
|
|
|
|
|
recommend that you explicitly add this setting to avoid confusion.
|
|
|
|
|
|
|
|
|
|
--
|
|
|
|
|
|
2017-11-01 12:21:11 -04:00
|
|
|
|
`xpack.security.hide_settings`::
|
|
|
|
|
A comma-separated list of settings that are omitted from the results of the
|
|
|
|
|
<<cluster-nodes-info,cluster nodes info API>>. You can use wildcards to include
|
|
|
|
|
multiple settings in the list. For example, the following value hides all the
|
|
|
|
|
settings for the ad1 realm: `xpack.security.authc.realms.ad1.*`. The API already
|
|
|
|
|
omits all `ssl` settings, `bind_dn`, and `bind_password` due to the
|
|
|
|
|
sensitive nature of the information.
|
2017-10-24 11:38:37 -04:00
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[password-security-settings]]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
==== Default password security settings
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`xpack.security.authc.accept_default_password`::
|
|
|
|
|
In `elasticsearch.yml`, set this to `false` to disable support for the default "changeme" password.
|
|
|
|
|
|
2018-08-21 05:05:42 -04:00
|
|
|
|
[[password-hashing-settings]]
|
|
|
|
|
==== Password hashing settings
|
|
|
|
|
`xpack.security.authc.password_hashing.algorithm`::
|
|
|
|
|
Specifies the hashing algorithm that is used for secure user credential storage.
|
|
|
|
|
See <<password-hashing-algorithms>>. Defaults to `bcrypt`.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[anonymous-access-settings]]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
==== Anonymous access settings
|
2017-06-27 12:14:35 -04:00
|
|
|
|
You can configure the following anonymous access settings in
|
2017-06-26 13:35:25 -04:00
|
|
|
|
`elasticsearch.yml`. For more information, see {xpack-ref}/anonymous-access.html[
|
2018-04-27 15:40:05 -04:00
|
|
|
|
Enabling anonymous access].
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`xpack.security.authc.anonymous.username`::
|
2017-06-27 12:14:35 -04:00
|
|
|
|
The username (principal) of the anonymous user. Defaults to `_es_anonymous_user`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`xpack.security.authc.anonymous.roles`::
|
|
|
|
|
The roles to associate with the anonymous user. Required.
|
|
|
|
|
|
|
|
|
|
`xpack.security.authc.anonymous.authz_exception`::
|
|
|
|
|
When `true`, an HTTP 403 response is returned if the anonymous user
|
|
|
|
|
does not have the appropriate permissions for the requested action. The
|
|
|
|
|
user is not prompted to provide credentials to access the requested
|
2017-06-27 12:14:35 -04:00
|
|
|
|
resource. When set to `false`, a HTTP 401 is returned and the user
|
|
|
|
|
can provide credentials with the appropriate permissions to gain
|
2017-04-06 20:34:23 -04:00
|
|
|
|
access. Defaults to `true`.
|
|
|
|
|
|
|
|
|
|
[float]
|
|
|
|
|
[[field-document-security-settings]]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
==== Document and field level security settings
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
You can set the following document and field level security
|
2017-06-27 12:14:35 -04:00
|
|
|
|
settings in `elasticsearch.yml`. For more information, see
|
2018-04-27 15:40:05 -04:00
|
|
|
|
{xpack-ref}/field-and-document-access-control.html[Setting up document and field
|
|
|
|
|
level security].
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`xpack.security.dls_fls.enabled`::
|
2017-06-27 12:14:35 -04:00
|
|
|
|
Set to `false` to prevent document and field level security
|
2017-04-06 20:34:23 -04:00
|
|
|
|
from being configured. Defaults to `true`.
|
|
|
|
|
|
2017-06-22 10:45:14 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[token-service-settings]]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
==== Token service settings
|
2017-06-22 10:45:14 -04:00
|
|
|
|
|
|
|
|
|
You can set the following token service settings in
|
|
|
|
|
`elasticsearch.yml`.
|
|
|
|
|
|
|
|
|
|
`xpack.security.authc.token.enabled`::
|
2017-08-23 06:21:30 -04:00
|
|
|
|
Set to `false` to disable the built-in token service. Defaults to `true` unless
|
2018-05-02 14:42:05 -04:00
|
|
|
|
`xpack.security.http.ssl.enabled` is `false`. This prevents sniffing the token
|
|
|
|
|
from a connection over plain http.
|
2017-06-22 10:45:14 -04:00
|
|
|
|
|
|
|
|
|
`xpack.security.authc.token.timeout`::
|
|
|
|
|
The length of time that a token is valid for. By default this value is `20m` or
|
|
|
|
|
20 minutes. The maximum value is 1 hour.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[realm-settings]]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
==== Realm settings
|
2017-06-27 12:14:35 -04:00
|
|
|
|
You configure realm settings in the `xpack.security.authc.realms`
|
2017-04-06 20:34:23 -04:00
|
|
|
|
namespace in `elasticsearch.yml`. For example:
|
|
|
|
|
|
|
|
|
|
[source,yaml]
|
|
|
|
|
----------------------------------------
|
|
|
|
|
xpack.security.authc.realms:
|
|
|
|
|
|
|
|
|
|
realm1:
|
|
|
|
|
type: native
|
|
|
|
|
order: 0
|
|
|
|
|
...
|
|
|
|
|
|
|
|
|
|
realm2:
|
|
|
|
|
type: ldap
|
|
|
|
|
order: 1
|
|
|
|
|
...
|
|
|
|
|
|
|
|
|
|
realm3:
|
|
|
|
|
type: active_directory
|
|
|
|
|
order: 2
|
|
|
|
|
...
|
|
|
|
|
...
|
|
|
|
|
----------------------------------------
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
The valid settings vary depending on the realm type. For more
|
2018-04-27 15:40:05 -04:00
|
|
|
|
information, see {xpack-ref}/setting-up-authentication.html[Setting up authentication].
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
[float]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
[[ref-realm-settings]]
|
|
|
|
|
===== Settings valid for all realms
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`type`::
|
2017-04-06 20:34:23 -04:00
|
|
|
|
The type of the realm: `native, `ldap`, `active_directory`, `pki`, or `file`. Required.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`order`::
|
2018-01-24 11:32:23 -05:00
|
|
|
|
The priority of the realm within the realm chain. Realms with a lower order are
|
|
|
|
|
consulted first. Although not required, use of this setting is strongly
|
|
|
|
|
recommended when you configure multiple realms. Defaults to `Integer.MAX_VALUE`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`enabled`::
|
2018-01-24 11:32:23 -05:00
|
|
|
|
Indicates whether a realm is enabled. You can use this setting to disable a
|
|
|
|
|
realm without removing its configuration information. Defaults to `true`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2018-04-27 15:40:05 -04:00
|
|
|
|
[[ref-native-settings]]
|
|
|
|
|
[float]
|
|
|
|
|
===== Native realm settings
|
|
|
|
|
|
|
|
|
|
For a native realm, the `type` must be set to `native`. In addition to the
|
|
|
|
|
<<ref-realm-settings,settings that are valid for all realms>>, you can specify
|
|
|
|
|
the following optional settings:
|
|
|
|
|
|
2018-04-30 11:04:15 -04:00
|
|
|
|
`cache.ttl`:: The time-to-live for cached user entries. A user and a hash of its
|
|
|
|
|
credentials are cached for this period of time. Specify the time period using
|
|
|
|
|
the standard {es} <<time-units,time units>>. Defaults to `20m`.
|
2018-04-27 15:40:05 -04:00
|
|
|
|
|
|
|
|
|
`cache.max_users`:: The maximum number of user entries that can live in the
|
|
|
|
|
cache at any given time. Defaults to 100,000.
|
|
|
|
|
|
|
|
|
|
`cache.hash_algo`:: (Expert Setting) The hashing algorithm that is used for the
|
2018-08-21 05:05:42 -04:00
|
|
|
|
in-memory cached user credentials. For possible values, see <<cache-hash-algo>>.
|
|
|
|
|
Defaults to `ssha256`.
|
2018-04-27 15:40:05 -04:00
|
|
|
|
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
[[ref-users-settings]]
|
|
|
|
|
|
|
|
|
|
[float]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
===== File realm settings
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2018-05-01 11:55:35 -04:00
|
|
|
|
The `type` setting must be set to `file`. In addition to the
|
|
|
|
|
<<ref-realm-settings,settings that are valid for all realms>>, you can specify
|
|
|
|
|
the following settings:
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`cache.ttl`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
The time-to-live for cached user entries. A user and a hash of its credentials
|
|
|
|
|
are cached for this configured period of time. Defaults to `20m`. Specify values
|
|
|
|
|
using the standard {es} {ref}/common-options.html#time-units[time units].
|
2017-04-06 20:34:23 -04:00
|
|
|
|
Defaults to `20m`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`cache.max_users`::
|
|
|
|
|
The maximum number of user entries that can live in the cache at a given time.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
Defaults to 100,000.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`cache.hash_algo`::
|
|
|
|
|
(Expert Setting) The hashing algorithm that is used for the in-memory cached
|
2018-08-21 05:05:42 -04:00
|
|
|
|
user credentials. See <<cache-hash-algo>>. Defaults to `ssha256`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
[[ref-ldap-settings]]
|
|
|
|
|
[float]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
===== LDAP realm settings
|
2018-04-30 11:04:15 -04:00
|
|
|
|
|
|
|
|
|
The `type` setting must be set to `ldap`. In addition to the
|
|
|
|
|
<<ref-realm-settings>>, you can specify the following settings:
|
|
|
|
|
|
|
|
|
|
`url`:: Specifies one or more LDAP URLs in the format
|
|
|
|
|
`ldap[s]://<server>:<port>`. Multiple URLs can be defined using a comma
|
|
|
|
|
separated value or array syntax: `[ "ldaps://server1:636", "ldaps://server2:636" ]`.
|
|
|
|
|
`ldaps` and `ldap` URL protocols cannot be mixed in the same realm. Required.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`load_balance.type`::
|
|
|
|
|
The behavior to use when there are multiple LDAP URLs defined. For supported
|
2018-04-30 11:04:15 -04:00
|
|
|
|
values see <<load-balancing,load balancing and failover types>>.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
Defaults to `failover`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`load_balance.cache_ttl`::
|
|
|
|
|
When using `dns_failover` or `dns_round_robin` as the load balancing type,
|
|
|
|
|
this setting controls the amount of time to cache DNS lookups. Defaults
|
2017-04-06 20:34:23 -04:00
|
|
|
|
to `1h`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`bind_dn`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
The DN of the user that is used to bind to the LDAP and perform searches.
|
|
|
|
|
Only applicable in user search mode.
|
|
|
|
|
If not specified, an anonymous bind is attempted.
|
|
|
|
|
Defaults to Empty. Due to its potential security impact, `bind_dn` is not
|
|
|
|
|
exposed via the <<cluster-nodes-info,nodes info API>>.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`bind_password`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
deprecated[6.3] Use `secure_bind_password` instead. The password for the user
|
|
|
|
|
that is used to bind to the LDAP directory.
|
|
|
|
|
Defaults to Empty. Due to its potential security impact, `bind_password` is not
|
|
|
|
|
exposed via the <<cluster-nodes-info,nodes info API>>.
|
|
|
|
|
|
2018-03-29 02:31:45 -04:00
|
|
|
|
|
|
|
|
|
`secure_bind_password` (<<secure-settings,Secure>>)::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
The password for the user that is used to bind to the LDAP directory.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
Defaults to Empty.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_dn_templates`::
|
|
|
|
|
The DN template that replaces the user name with the string `{0}`.
|
2018-04-30 11:04:15 -04:00
|
|
|
|
This setting is multivalued; you can specify multiple user contexts.
|
|
|
|
|
Required to operate in user template mode. If `user_search.base_dn` is specified,
|
|
|
|
|
this setting is not valid. For more information on
|
2017-06-27 12:14:35 -04:00
|
|
|
|
the different modes, see {xpack-ref}/ldap-realm.html[LDAP realms].
|
2018-04-30 11:04:15 -04:00
|
|
|
|
+
|
|
|
|
|
--
|
|
|
|
|
NOTE: If any settings starting with `user_search` are specified, the
|
|
|
|
|
`user_dn_templates` settings are ignored.
|
|
|
|
|
|
|
|
|
|
--
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_group_attribute`::
|
|
|
|
|
Specifies the attribute to examine on the user for group membership.
|
2018-04-30 11:04:15 -04:00
|
|
|
|
If any `group_search` settings are specified, this setting is ignored. Defaults
|
|
|
|
|
to `memberOf`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.base_dn`::
|
|
|
|
|
Specifies a container DN to search for users. Required
|
2018-04-30 11:04:15 -04:00
|
|
|
|
to operated in user search mode. If `user_dn_templates` is specified, this
|
|
|
|
|
setting is not valid. For more information on
|
2017-06-26 13:35:25 -04:00
|
|
|
|
the different modes, see {xpack-ref}/ldap-realm.html[LDAP realms].
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.scope`::
|
|
|
|
|
The scope of the user search. Valid values are `sub_tree`, `one_level` or
|
|
|
|
|
`base`. `one_level` only searches objects directly contained within the
|
|
|
|
|
`base_dn`. `sub_tree` searches all objects contained under `base_dn`.
|
|
|
|
|
`base` specifies that the `base_dn` is the user object, and that it is
|
2017-04-06 20:34:23 -04:00
|
|
|
|
the only user considered. Defaults to `sub_tree`.
|
|
|
|
|
|
2017-07-11 11:27:24 -04:00
|
|
|
|
`user_search.filter`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Specifies the filter used to search the directory in attempts to match
|
2017-07-11 11:27:24 -04:00
|
|
|
|
an entry with the username provided by the user. Defaults to `(uid={0})`.
|
|
|
|
|
`{0}` is substituted with the username provided when searching.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.attribute`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
deprecated[5.6] Use `user_search.filter` instead.
|
|
|
|
|
The attribute to match with the username sent with the request. Defaults to `uid`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`user_search.pool.enabled`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Enables or disables connection pooling for user search. If set to `false`, a new
|
|
|
|
|
connection is created for every search. The
|
|
|
|
|
default is `true` when `bind_dn` is set.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.pool.size`::
|
|
|
|
|
The maximum number of connections to the LDAP server to allow in the
|
2017-04-06 20:34:23 -04:00
|
|
|
|
connection pool. Defaults to `20`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.pool.initial_size`::
|
2017-04-06 20:34:23 -04:00
|
|
|
|
The initial number of connections to create to the LDAP server on startup.
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Defaults to `0`. If the LDAP server is down, values greater than `0` could cause
|
|
|
|
|
startup failures.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.pool.health_check.enabled`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Enables or disables a health check on LDAP connections in the connection
|
2017-04-06 20:34:23 -04:00
|
|
|
|
pool. Connections are checked in the background at the specified interval.
|
|
|
|
|
Defaults to `true`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.pool.health_check.dn`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
The distinguished name that is retrieved as part of the health check.
|
|
|
|
|
Defaults to the value of `bind_dn` if present; if
|
|
|
|
|
not, falls back to `user_search.base_dn`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.pool.health_check.interval`::
|
2017-04-06 20:34:23 -04:00
|
|
|
|
The interval to perform background checks of connections in the pool.
|
|
|
|
|
Defaults to `60s`.
|
2017-07-12 16:01:39 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`group_search.base_dn`::
|
|
|
|
|
The container DN to search for groups in which the user has membership. When
|
2018-04-30 11:04:15 -04:00
|
|
|
|
this element is absent, {security} searches for the attribute specified by
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`user_group_attribute` set on the user in order to determine group membership.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`group_search.scope`::
|
|
|
|
|
Specifies whether the group search should be `sub_tree`, `one_level` or
|
|
|
|
|
`base`. `one_level` only searches objects directly contained within the
|
|
|
|
|
`base_dn`. `sub_tree` searches all objects contained under `base_dn`.
|
|
|
|
|
`base` specifies that the `base_dn` is a group object, and that it is the
|
2017-04-06 20:34:23 -04:00
|
|
|
|
only group considered. Defaults to `sub_tree`.
|
|
|
|
|
|
2018-04-30 11:04:15 -04:00
|
|
|
|
`group_search.filter`::
|
|
|
|
|
Specifies a filter to use to look up a group.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
When not set, the realm searches for `group`, `groupOfNames`, `groupOfUniqueNames`,
|
|
|
|
|
or `posixGroup` with the attributes `member`, `memberOf`, or `memberUid`. Any
|
|
|
|
|
instance of `{0}` in the filter is replaced by the user attribute defined in
|
|
|
|
|
`group_search.user_attribute`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`group_search.user_attribute`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Specifies the user attribute that is fetched and provided as a parameter to
|
2017-04-06 20:34:23 -04:00
|
|
|
|
the filter. If not set, the user DN is passed into the filter. Defaults to Empty.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`unmapped_groups_as_roles`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
If set to `true`, the names of any unmapped LDAP groups are used as role names
|
|
|
|
|
and assigned to the user. A group is considered to be _unmapped_ if it is not
|
|
|
|
|
not referenced in a
|
|
|
|
|
{xpack-ref}/mapping-roles.html#mapping-roles-file[role-mapping file]. API-based
|
|
|
|
|
role mappings are not considered. Defaults to `false`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`files.role_mapping`::
|
|
|
|
|
The {xpack-ref}/security-files.html[location] for the {xpack-ref}/mapping-roles.html#mapping-roles[
|
|
|
|
|
YAML role mapping configuration file]. Defaults to
|
2018-06-28 11:27:04 -04:00
|
|
|
|
`ES_PATH_CONF/role_mapping.yml`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`follow_referrals`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Specifies whether {security} should follow referrals returned
|
2017-06-27 12:14:35 -04:00
|
|
|
|
by the LDAP server. Referrals are URLs returned by the server that are to be
|
2018-04-30 11:04:15 -04:00
|
|
|
|
used to continue the LDAP operation (for example, search). Defaults to `true`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-06 00:12:31 -04:00
|
|
|
|
`metadata`::
|
|
|
|
|
A list of additional LDAP attributes that should be loaded from the
|
|
|
|
|
LDAP server and stored in the authenticated user's metadata field.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`timeout.tcp_connect`::
|
|
|
|
|
The TCP connect timeout period for establishing an LDAP connection.
|
|
|
|
|
An `s` at the end indicates seconds, or `ms` indicates milliseconds.
|
|
|
|
|
Defaults to `5s` (5 seconds ).
|
|
|
|
|
|
|
|
|
|
`timeout.tcp_read`::
|
|
|
|
|
The TCP read timeout period after establishing an LDAP connection.
|
|
|
|
|
An `s` at the end indicates seconds, or `ms` indicates milliseconds.
|
|
|
|
|
Defaults to `5s` (5 seconds ).
|
|
|
|
|
|
|
|
|
|
`timeout.ldap_search`::
|
|
|
|
|
The LDAP Server enforced timeout period for an LDAP search.
|
|
|
|
|
An `s` at the end indicates seconds, or `ms` indicates milliseconds.
|
|
|
|
|
Defaults to `5s` (5 seconds ).
|
|
|
|
|
|
|
|
|
|
`ssl.key`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Path to a PEM encoded file containing the private key, which is used if the
|
|
|
|
|
LDAP server requires client authentication. `ssl.key` and `ssl.keystore.path`
|
|
|
|
|
cannot be used at the same time.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`ssl.key_passphrase`::
|
2017-10-24 11:38:37 -04:00
|
|
|
|
The passphrase that is used to decrypt the private key. This value is
|
2017-04-06 20:34:23 -04:00
|
|
|
|
optional as the key may not be encrypted.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`ssl.secure_key_passphrase` (<<secure-settings,Secure>>)::
|
|
|
|
|
The passphrase that is used to decrypt the private key.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`ssl.certificate`::
|
|
|
|
|
Path to a PEM encoded file containing the certificate (or certificate chain)
|
|
|
|
|
that will be presented to clients when they connect.
|
|
|
|
|
|
|
|
|
|
`ssl.certificate_authorities`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
List of paths to PEM encoded certificate files that should be trusted.
|
|
|
|
|
`ssl.certificate_authorities` and `ssl.truststore.path` cannot be used at the
|
|
|
|
|
same time.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`ssl.keystore.path`::
|
|
|
|
|
The path to the Java Keystore file that contains a private key and certificate.
|
|
|
|
|
`ssl.key` and `ssl.keystore.path` may not be used at the same time.
|
|
|
|
|
|
2017-07-25 03:31:37 -04:00
|
|
|
|
`ssl.keystore.type`::
|
|
|
|
|
The format of the keystore file. Should be either `jks` to use the Java
|
|
|
|
|
Keystore format, or `PKCS12` to use PKCS#12 files. The default is `jks`.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`ssl.keystore.password`::
|
|
|
|
|
The password to the keystore.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`ssl.keystore.secure_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
The password to the keystore.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`ssl.keystore.key_password`::
|
|
|
|
|
The password for the key in the keystore. Defaults to the keystore password.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`ssl.keystore.secure_key_password`::
|
|
|
|
|
The password for the key in the keystore. Defaults to the keystore password.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`ssl.truststore.path`::
|
|
|
|
|
The path to the Java Keystore file that contains the certificates to trust.
|
2018-04-30 11:04:15 -04:00
|
|
|
|
`ssl.certificate_authorities` and `ssl.truststore.path` cannot be used at the same time.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`ssl.truststore.password`::
|
|
|
|
|
The password to the truststore.
|
|
|
|
|
|
|
|
|
|
`ssl.truststore.secure_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
The password to the truststore.
|
|
|
|
|
|
2017-07-25 03:31:37 -04:00
|
|
|
|
`ssl.truststore.type`::
|
|
|
|
|
The format of the keystore file. Should be either `jks` to use the Java
|
|
|
|
|
Keystore format, or `PKCS12` to use PKCS#12 files. The default is `jks`.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`ssl.verification_mode`::
|
|
|
|
|
Indicates the type of verification when using `ldaps` to protect against man
|
|
|
|
|
in the middle attacks and certificate forgery. Values are `none`, `certificate`,
|
|
|
|
|
and `full`. Defaults to the value of `xpack.ssl.verification_mode`.
|
2018-04-10 06:27:23 -04:00
|
|
|
|
+
|
|
|
|
|
See <<ssl-tls-settings,`xpack.ssl.verification_mode`>> for an explanation of
|
|
|
|
|
these values.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`ssl.supported_protocols`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Supported protocols for TLS/SSL (with versions). Defaults to the value of
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`xpack.ssl.supported_protocols`.
|
|
|
|
|
|
2018-04-30 11:04:15 -04:00
|
|
|
|
`ssl.cipher_suites`:: Specifies the cipher suites that should be supported when
|
|
|
|
|
communicating with the LDAP server.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html[
|
|
|
|
|
Java Cryptography Architecture documentation]. Defaults to the value of
|
|
|
|
|
`xpack.ssl.cipher_suites`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`cache.ttl`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Specifies the time-to-live for cached user entries. A user and a hash of its
|
|
|
|
|
credentials are cached for this period of time. Use the standard {es}
|
|
|
|
|
<<time-units,time units>>. Defaults to `20m`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`cache.max_users`::
|
|
|
|
|
Specifies the maximum number of user entries that the cache can contain.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
Defaults to `100000`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`cache.hash_algo`::
|
|
|
|
|
(Expert Setting) Specifies the hashing algorithm that is used for the
|
2018-08-21 05:05:42 -04:00
|
|
|
|
in-memory cached user credentials. See <<cache-hash-algo>>. Defaults to `ssha256`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
[[ref-ad-settings]]
|
|
|
|
|
[float]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
===== Active Directory realm settings
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2018-04-30 11:52:21 -04:00
|
|
|
|
The `type` setting must be set to `active_directory`. In addition to the
|
|
|
|
|
<<ref-realm-settings,settings that are valid for all realms>>, you can specify
|
|
|
|
|
the following settings:
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`url`::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
An LDAP URL of the form `ldap[s]://<server>:<port>`. {security} attempts to
|
|
|
|
|
authenticate against this URL. If the URL is not specified, it is derived from
|
|
|
|
|
the `domain_name` setting and assumes an unencrypted connection to port 389.
|
|
|
|
|
Defaults to `ldap://<domain_name>:389`. This setting is required when connecting
|
|
|
|
|
using SSL/TLS or when using a custom port.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`load_balance.type`::
|
|
|
|
|
The behavior to use when there are multiple LDAP URLs defined. For supported
|
2018-04-30 11:52:21 -04:00
|
|
|
|
values see <<load-balancing,load balancing and failover types>>.
|
|
|
|
|
Defaults to `failover`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`load_balance.cache_ttl`::
|
|
|
|
|
When using `dns_failover` or `dns_round_robin` as the load balancing type,
|
2017-04-06 20:34:23 -04:00
|
|
|
|
this setting controls the amount of time to cache DNS lookups. Defaults
|
|
|
|
|
to `1h`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`domain_name`::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
The domain name of Active Directory. If the the `url` and `user_search_dn`
|
|
|
|
|
settings are not specified, the cluster can derive those values from this
|
|
|
|
|
setting. Required.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-07-12 16:01:39 -04:00
|
|
|
|
`bind_dn`::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
The DN of the user that is used to bind to Active Directory and perform searches.
|
|
|
|
|
Defaults to Empty. Due to its potential security impact, `bind_dn` is not
|
|
|
|
|
exposed via the <<cluster-nodes-info,nodes info API>>.
|
2017-07-12 16:01:39 -04:00
|
|
|
|
|
|
|
|
|
`bind_password`::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
deprecated[6.3] Use `secure_bind_password` instead. The password for the user
|
|
|
|
|
that is used to bind to Active Directory. Defaults to Empty. Due to its
|
|
|
|
|
potential security impact, `bind_password` is not exposed via the
|
|
|
|
|
<<cluster-nodes-info,nodes info API>>.
|
2018-03-29 02:31:45 -04:00
|
|
|
|
|
|
|
|
|
`secure_bind_password` (<<secure-settings,Secure>>)::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
The password for the user that is used to bind to Active Directory.
|
2018-03-29 02:31:45 -04:00
|
|
|
|
Defaults to Empty.
|
2017-07-12 16:01:39 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`unmapped_groups_as_roles`::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
If set to `true`, the names of any unmapped Active Directory groups are used as
|
|
|
|
|
role names and assigned to the user. A group is considered _unmapped_ when it
|
|
|
|
|
is not referenced in any role-mapping files. API-based role mappings are not
|
|
|
|
|
considered. Defaults to `false`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`files.role_mapping`::
|
2017-06-26 13:35:25 -04:00
|
|
|
|
The {xpack-ref}/security-files.html[location] for the YAML
|
2018-06-28 11:27:04 -04:00
|
|
|
|
role mapping configuration file. Defaults to `ES_PATH_CONF/role_mapping.yml`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.base_dn`::
|
|
|
|
|
The context to search for a user. Defaults to the root
|
|
|
|
|
of the Active Directory domain.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.scope`::
|
|
|
|
|
Specifies whether the user search should be `sub_tree`, `one_level` or `base`.
|
|
|
|
|
`one_level` only searches users directly contained within the `base_dn`.
|
|
|
|
|
`sub_tree` searches all objects contained under `base_dn`. `base`
|
|
|
|
|
specifies that the `base_dn` is a user object, and that it is the
|
2017-04-06 20:34:23 -04:00
|
|
|
|
only user considered. Defaults to `sub_tree`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`user_search.filter`::
|
|
|
|
|
Specifies a filter to use to lookup a user given a username. The default
|
|
|
|
|
filter looks up `user` objects with either `sAMAccountName` or
|
2018-04-30 11:52:21 -04:00
|
|
|
|
`userPrincipalName`. If specified, this must be a valid LDAP user search filter.
|
|
|
|
|
For example `(&(objectClass=user)(sAMAccountName={0}))`. For more information,
|
|
|
|
|
see
|
|
|
|
|
https://msdn.microsoft.com/en-us/library/aa746475(v=vs.85).aspx[Search Filter Syntax].
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-04-27 10:20:59 -04:00
|
|
|
|
`user_search.upn_filter`::
|
|
|
|
|
Specifies a filter to use to lookup a user given a user principal name.
|
2017-07-13 12:08:22 -04:00
|
|
|
|
The default filter looks up `user` objects with
|
|
|
|
|
a matching `userPrincipalName`. If specified, this
|
2018-04-30 11:52:21 -04:00
|
|
|
|
must be a valid LDAP user search filter. For example,
|
2017-07-13 12:08:22 -04:00
|
|
|
|
`(&(objectClass=user)(userPrincipalName={1}))`. `{1}` is the full user principal name
|
2018-04-30 11:52:21 -04:00
|
|
|
|
provided by the user. For more information, see
|
|
|
|
|
https://msdn.microsoft.com/en-us/library/aa746475(v=vs.85).aspx[Search Filter Syntax].
|
2017-04-27 10:20:59 -04:00
|
|
|
|
|
|
|
|
|
`user_search.down_level_filter`::
|
|
|
|
|
Specifies a filter to use to lookup a user given a down level logon name
|
|
|
|
|
(DOMAIN\user). The default filter looks up `user` objects with a matching
|
|
|
|
|
`sAMAccountName` in the domain provided. If specified, this
|
2018-04-30 11:52:21 -04:00
|
|
|
|
must be a valid LDAP user search filter. For example,
|
|
|
|
|
`(&(objectClass=user)(sAMAccountName={0}))`. For more information, see
|
|
|
|
|
https://msdn.microsoft.com/en-us/library/aa746475(v=vs.85).aspx[Search Filter Syntax].
|
2017-04-27 10:20:59 -04:00
|
|
|
|
|
2017-07-12 16:01:39 -04:00
|
|
|
|
`user_search.pool.enabled`::
|
|
|
|
|
Enables or disables connection pooling for user search. When
|
|
|
|
|
disabled a new connection is created for every search. The
|
|
|
|
|
default is `true` when `bind_dn` is provided.
|
|
|
|
|
|
|
|
|
|
`user_search.pool.size`::
|
|
|
|
|
The maximum number of connections to the Active Directory server to allow in the
|
|
|
|
|
connection pool. Defaults to `20`.
|
|
|
|
|
|
|
|
|
|
`user_search.pool.initial_size`::
|
|
|
|
|
The initial number of connections to create to the Active Directory server on startup.
|
2018-04-30 11:52:21 -04:00
|
|
|
|
Defaults to `0`. If the LDAP server is down, values greater than 0
|
|
|
|
|
could cause startup failures.
|
2017-07-12 16:01:39 -04:00
|
|
|
|
|
|
|
|
|
`user_search.pool.health_check.enabled`::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
Enables or disables a health check on Active Directory connections in the connection
|
2017-07-12 16:01:39 -04:00
|
|
|
|
pool. Connections are checked in the background at the specified interval.
|
|
|
|
|
Defaults to `true`.
|
|
|
|
|
|
|
|
|
|
`user_search.pool.health_check.dn`::
|
|
|
|
|
The distinguished name to be retrieved as part of the health check.
|
2018-04-30 11:52:21 -04:00
|
|
|
|
Defaults to the value of `bind_dn` if that setting is present. Otherwise, it
|
|
|
|
|
defaults to the value of the `user_search.base_dn` setting.
|
2017-07-12 16:01:39 -04:00
|
|
|
|
|
|
|
|
|
`user_search.pool.health_check.interval`::
|
|
|
|
|
The interval to perform background checks of connections in the pool.
|
|
|
|
|
Defaults to `60s`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`group_search.base_dn`::
|
|
|
|
|
The context to search for groups in which the user has membership. Defaults
|
2018-04-30 11:52:21 -04:00
|
|
|
|
to the root of the Active Directory domain.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`group_search.scope`::
|
|
|
|
|
Specifies whether the group search should be `sub_tree`, `one_level` or
|
|
|
|
|
`base`. `one_level` searches for groups directly contained within the
|
|
|
|
|
`base_dn`. `sub_tree` searches all objects contained under `base_dn`.
|
|
|
|
|
`base` specifies that the `base_dn` is a group object, and that it is
|
2017-04-06 20:34:23 -04:00
|
|
|
|
the only group considered. Defaults to `sub_tree`.
|
|
|
|
|
|
2017-06-06 00:12:31 -04:00
|
|
|
|
`metadata`::
|
|
|
|
|
A list of additional LDAP attributes that should be loaded from the
|
|
|
|
|
LDAP server and stored in the authenticated user's metadata field.
|
|
|
|
|
|
|
|
|
|
`timeout.tcp_connect`::
|
2017-06-27 12:14:35 -04:00
|
|
|
|
The TCP connect timeout period for establishing an LDAP connection.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
An `s` at the end indicates seconds, or `ms` indicates milliseconds.
|
|
|
|
|
Defaults to `5s` (5 seconds ).
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`timeout.tcp_read`::
|
|
|
|
|
The TCP read timeout period after establishing an LDAP connection.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
An `s` at the end indicates seconds, or `ms` indicates milliseconds.
|
|
|
|
|
Defaults to `5s` (5 seconds ).
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`timeout.ldap_search`::
|
|
|
|
|
The LDAP Server enforced timeout period for an LDAP search.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
An `s` at the end indicates seconds, or `ms` indicates milliseconds.
|
|
|
|
|
Defaults to `5s` (5 seconds ).
|
|
|
|
|
|
|
|
|
|
`ssl.certificate`::
|
|
|
|
|
Path to a PEM encoded file containing the certificate (or certificate chain)
|
2018-04-30 11:52:21 -04:00
|
|
|
|
that will be presented to clients when they connect.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`ssl.certificate_authorities`::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
List of paths to PEM encoded certificate files that should be trusted.
|
|
|
|
|
`ssl.certificate_authorities` and `ssl.truststore.path` cannot be used at the
|
|
|
|
|
same time.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`ssl.key`::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
Path to the PEM encoded file containing the private key, which is used when the
|
|
|
|
|
Active Directory server requires client authentication. `ssl.key` and
|
|
|
|
|
`ssl.keystore.path` cannot be used at the same time.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
|
|
|
|
|
`ssl.key_passphrase`::
|
|
|
|
|
The passphrase that is used to decrypt the private key. This value is
|
|
|
|
|
optional as the key might not be encrypted.
|
|
|
|
|
|
|
|
|
|
`ssl.secure_key_passphrase` (<<secure-settings,Secure>>)::
|
|
|
|
|
The passphrase that is used to decrypt the private key. This value is
|
|
|
|
|
optional as the key might not be encrypted.
|
|
|
|
|
|
|
|
|
|
`ssl.keystore.key_password`::
|
|
|
|
|
The password for the key in the keystore. Defaults to the keystore password.
|
|
|
|
|
|
|
|
|
|
`ssl.keystore.secure_key_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
The password for the key in the keystore. Defaults to the keystore password.
|
|
|
|
|
|
|
|
|
|
`ssl.keystore.password`::
|
|
|
|
|
The password to the keystore.
|
|
|
|
|
|
|
|
|
|
`ssl.secure_keystore.password` (<<secure-settings,Secure>>)::
|
|
|
|
|
The password to the keystore.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`ssl.keystore.path`::
|
|
|
|
|
The path to the Java Keystore file that contains a private key and certificate.
|
2018-04-30 11:52:21 -04:00
|
|
|
|
`ssl.key` and `ssl.keystore.path` cannot be used at the same time.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-07-25 03:31:37 -04:00
|
|
|
|
`ssl.keystore.type`::
|
|
|
|
|
The format of the keystore file. Should be either `jks` to use the Java
|
|
|
|
|
Keystore format, or `PKCS12` to use PKCS#12 files. The default is `jks`.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`ssl.truststore.password`::
|
|
|
|
|
The password to the truststore.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`ssl.truststore.secure_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
The password to the truststore.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`ssl.truststore.path`::
|
|
|
|
|
The path to the Java Keystore file that contains the certificates to trust.
|
2018-04-30 11:52:21 -04:00
|
|
|
|
`ssl.certificate_authorities` and `ssl.truststore.path` cannot be used at the
|
|
|
|
|
same time.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-07-25 03:31:37 -04:00
|
|
|
|
`ssl.truststore.type`::
|
|
|
|
|
The format of the truststore file. Should be either `jks` to use the Java
|
|
|
|
|
Keystore format, or `PKCS12` to use PKCS#12 files. The default is `jks`.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`ssl.verification_mode`::
|
|
|
|
|
Indicates the type of verification when using `ldaps` to protect against man
|
|
|
|
|
in the middle attacks and certificate forgery. Values are `none`, `certificate`,
|
|
|
|
|
and `full`. Defaults to the value of `xpack.ssl.verification_mode`.
|
2018-04-10 06:27:23 -04:00
|
|
|
|
+
|
|
|
|
|
See <<ssl-tls-settings,`xpack.ssl.verification_mode`>> for an explanation of
|
|
|
|
|
these values.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`ssl.supported_protocols`::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
Supported protocols for TLS/SSL (with versions). Defaults to the value of
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`xpack.ssl.supported_protocols`.
|
|
|
|
|
|
2018-04-30 11:52:21 -04:00
|
|
|
|
`ssl.cipher_suites`:: Specifies the cipher suites that should be supported when
|
|
|
|
|
communicating with the Active Directory server.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html[
|
|
|
|
|
Java Cryptography Architecture documentation]. Defaults to the value of
|
|
|
|
|
`xpack.ssl.cipher_suites`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`cache.ttl`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Specifies the time-to-live for cached user entries. A user and a hash of its
|
|
|
|
|
credentials are cached for this configured period of time. Use the
|
2017-04-06 20:34:23 -04:00
|
|
|
|
standard Elasticsearch {ref}/common-options.html#time-units[time units]).
|
|
|
|
|
Defaults to `20m`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`cache.max_users`::
|
|
|
|
|
Specifies the maximum number of user entries that the cache can contain.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
Defaults to `100000`.
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`cache.hash_algo`::
|
2018-04-30 11:52:21 -04:00
|
|
|
|
(Expert Setting) Specifies the hashing algorithm that is used for
|
2018-08-21 05:05:42 -04:00
|
|
|
|
the in-memory cached user credentials. See <<cache-hash-algo>>. Defaults to `ssha256`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2018-04-30 11:52:21 -04:00
|
|
|
|
`follow_referrals`::
|
|
|
|
|
If set to `true` {security} follows referrals returned by the LDAP server.
|
|
|
|
|
Referrals are URLs returned by the server that are to be used to continue the
|
|
|
|
|
LDAP operation (such as `search`). Defaults to `true`.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
[[ref-pki-settings]]
|
|
|
|
|
[float]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
===== PKI realm settings
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The `type` setting must be set to `pki`. In addition to the
|
|
|
|
|
<<ref-realm-settings,settings that are valid for all realms>>, you can specify
|
|
|
|
|
the following settings:
|
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`username_pattern`::
|
|
|
|
|
The regular expression pattern used to extract the username from the
|
|
|
|
|
certificate DN. The first match group is the used as the username.
|
2018-01-24 11:32:23 -05:00
|
|
|
|
Defaults to `CN=(.*?)(?:,\|$)`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`certificate_authorities`::
|
2018-01-24 11:32:23 -05:00
|
|
|
|
List of paths to the PEM certificate files that should be used to authenticate a
|
|
|
|
|
user's certificate as trusted. Defaults to the trusted certificates configured
|
2018-05-01 17:42:29 -04:00
|
|
|
|
for SSL. This setting cannot be used with `truststore.path`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`truststore.algorithm`::
|
|
|
|
|
Algorithm for the truststore. Defaults to `SunX509`.
|
2017-06-27 12:14:35 -04:00
|
|
|
|
|
|
|
|
|
`truststore.password`::
|
2017-04-06 20:34:23 -04:00
|
|
|
|
The password for the truststore. Must be provided if `truststore.path` is set.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`truststore.secure_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
The password for the truststore.
|
|
|
|
|
|
|
|
|
|
`truststore.path`::
|
2018-01-24 11:32:23 -05:00
|
|
|
|
The path of a truststore to use. Defaults to the trusted certificates configured
|
2018-05-01 17:42:29 -04:00
|
|
|
|
for SSL. This setting cannot be used with `certificate_authorities`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-06-27 12:14:35 -04:00
|
|
|
|
`files.role_mapping`::
|
|
|
|
|
Specifies the {xpack-ref}/security-files.html[location] of the
|
2017-06-26 13:35:25 -04:00
|
|
|
|
{xpack-ref}/mapping-roles.html[YAML role mapping configuration file].
|
2018-06-28 11:27:04 -04:00
|
|
|
|
Defaults to `ES_PATH_CONF/role_mapping.yml`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2018-04-20 11:53:47 -04:00
|
|
|
|
`cache.ttl`::
|
2018-04-30 11:04:15 -04:00
|
|
|
|
Specifies the time-to-live for cached user entries. A user and a hash of its
|
|
|
|
|
credentials are cached for this period of time. Use the
|
|
|
|
|
standard {es} {ref}/common-options.html#time-units[time units]).
|
2018-04-20 11:53:47 -04:00
|
|
|
|
Defaults to `20m`.
|
|
|
|
|
|
|
|
|
|
`cache.max_users`::
|
|
|
|
|
Specifies the maximum number of user entries that the cache can contain.
|
|
|
|
|
Defaults to `100000`.
|
|
|
|
|
|
2018-02-04 20:22:54 -05:00
|
|
|
|
[[ref-saml-settings]]
|
|
|
|
|
[float]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
===== SAML realm settings
|
2018-05-01 14:53:11 -04:00
|
|
|
|
|
|
|
|
|
The `type` setting must be set to `saml`. In addition to the
|
|
|
|
|
<<ref-realm-settings,settings that are valid for all realms>>, you can specify
|
|
|
|
|
the following settings:
|
|
|
|
|
|
2018-02-04 20:22:54 -05:00
|
|
|
|
`idp.entity_id`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The Entity ID of the SAML Identity Provider. An Entity ID is a URI with a
|
|
|
|
|
maximum length of 1024 characters. It can be a URL (https://idp.example.com/) or
|
|
|
|
|
a URN (`urn:example.com:idp`) and can be found in the configuration or the SAML
|
|
|
|
|
metadata of the Identity Provider.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`idp.metadata.path`::
|
|
|
|
|
The path _(recommended)_ or URL to a SAML 2.0 metadata file describing the
|
2018-04-05 15:06:43 -04:00
|
|
|
|
capabilities and configuration of the Identity Provider.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
If a path is provided, then it is resolved relative to the {es} config
|
|
|
|
|
directory.
|
|
|
|
|
If a URL is provided, then it must be either a `file` URL or a `https` URL.
|
2018-05-01 14:53:11 -04:00
|
|
|
|
{security} automatically polls this metadata resource and reloads
|
2018-02-04 20:22:54 -05:00
|
|
|
|
the IdP configuration when changes are detected.
|
|
|
|
|
File based resources are polled at a frequency determined by the global {es}
|
|
|
|
|
`resource.reload.interval.high` setting, which defaults to 5 seconds.
|
|
|
|
|
HTTPS resources are polled at a frequency determined by the realm's
|
|
|
|
|
`idp.metadata.http.refresh` setting.
|
|
|
|
|
|
|
|
|
|
`idp.metadata.http.refresh`::
|
|
|
|
|
Controls the frequency with which `https` metadata is checked for changes.
|
|
|
|
|
Defaults to `1h` (1 hour).
|
|
|
|
|
|
|
|
|
|
`idp.use_single_logout`::
|
|
|
|
|
Indicates whether to utilise the Identity Provider's Single Logout service
|
|
|
|
|
(if one exists in the IdP metadata file).
|
|
|
|
|
Defaults to `true`.
|
|
|
|
|
|
|
|
|
|
`sp.entity_id`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The Entity ID to use for this SAML Service Provider. This should be entered as a
|
|
|
|
|
URI. We recommend that you use the base URL of your Kibana instance. For example,
|
|
|
|
|
`https://kibana.example.com/`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`sp.acs`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The URL of the Assertion Consumer Service within {kib}. Typically this is the
|
|
|
|
|
"api/security/v1/saml" endpoint of your Kibana server. For example,
|
|
|
|
|
`https://kibana.example.com/api/security/v1/saml`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`sp.logout`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The URL of the Single Logout service within {kib}. Typically this is the
|
|
|
|
|
"logout" endpoint of your Kibana server. For example,
|
|
|
|
|
`https://kibana.example.com/logout`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`attributes.principal`::
|
|
|
|
|
The Name of the SAML attribute that should be used as the {security} user's
|
2018-05-01 14:53:11 -04:00
|
|
|
|
principal (username).
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`attributes.groups`::
|
|
|
|
|
The Name of the SAML attribute that should be used to populate {security}
|
2018-05-01 14:53:11 -04:00
|
|
|
|
user's groups.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`attributes.name`::
|
|
|
|
|
The Name of the SAML attribute that should be used to populate {security}
|
2018-05-01 14:53:11 -04:00
|
|
|
|
user's full name.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`attributes.mail`::
|
|
|
|
|
The Name of the SAML attribute that should be used to populate {security}
|
2018-05-01 14:53:11 -04:00
|
|
|
|
user's email address.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`attributes.dn`::
|
|
|
|
|
The Name of the SAML attribute that should be used to populate {security}
|
2018-05-01 14:53:11 -04:00
|
|
|
|
user's X.500 _Distinguished Name_.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`attribute_patterns.principal`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
A Java regular expression that is matched against the SAML attribute specified
|
2018-02-04 20:22:54 -05:00
|
|
|
|
by `attributes.pattern` before it is applied to the user's _principal_ property.
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The attribute value must match the pattern and the value of the first
|
|
|
|
|
_capturing group_ is used as the principal. For example, `^([^@]+)@example\\.com$`
|
|
|
|
|
matches email addresses from the "example.com" domain and uses the local-part as
|
|
|
|
|
the principal.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`attribute_patterns.groups`::
|
|
|
|
|
As per `attribute_patterns.principal`, but for the _group_ property.
|
|
|
|
|
|
|
|
|
|
`attribute_patterns.name`::
|
|
|
|
|
As per `attribute_patterns.principal`, but for the _name_ property.
|
|
|
|
|
|
|
|
|
|
`attribute_patterns.mail`::
|
|
|
|
|
As per `attribute_patterns.principal`, but for the _mail_ property.
|
|
|
|
|
|
|
|
|
|
`attribute_patterns.dn`::
|
|
|
|
|
As per `attribute_patterns.principal`, but for the _dn_ property.
|
|
|
|
|
|
|
|
|
|
`nameid_format`::
|
|
|
|
|
The NameID format that should be requested when asking the IdP to authenticate
|
2018-05-01 14:53:11 -04:00
|
|
|
|
the current user. Defaults to requesting _transient_ names
|
|
|
|
|
(`urn:oasis:names:tc:SAML:2.0:nameid-format:transient`).
|
|
|
|
|
|
|
|
|
|
`nameid.allow_create`:: The value of the `AllowCreate` attribute of the
|
|
|
|
|
`NameIdPolicy` element in an authentication request. Defaults to `false`.
|
|
|
|
|
|
|
|
|
|
`nameid.sp_qualifier`:: The value of the `SPNameQualifier` attribute of the
|
|
|
|
|
`NameIdPolicy` element in an authentication request. The default is to not
|
|
|
|
|
include the `SPNameQualifier` attribute.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`force_authn`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies whether to set the `ForceAuthn` attribute when requesting that the IdP
|
|
|
|
|
authenticate the current user. If set to `true`, the IdP is required to verify
|
|
|
|
|
the user’s identity, irrespective of any existing sessions they might have.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
Defaults to `false`.
|
|
|
|
|
|
|
|
|
|
`populate_user_metadata`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies whether to populate the {es} user's metadata with the values that are
|
|
|
|
|
provided by the SAML attributes. Defaults to `true`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`allowed_clock_skew`::
|
|
|
|
|
The maximum amount of skew that can be tolerated between the IdP's clock and the
|
|
|
|
|
{es} node's clock.
|
|
|
|
|
Defaults to `3m` (3 minutes).
|
|
|
|
|
|
2018-05-01 14:53:11 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[ref-saml-signing-settings]]
|
|
|
|
|
===== SAML realm signing settings
|
|
|
|
|
|
|
|
|
|
If a signing key is configured (that is, either `signing.key` or
|
|
|
|
|
`signing.keystore.path` is set), then {security} signs outgoing SAML messages.
|
|
|
|
|
Signing can be configured using the following settings:
|
|
|
|
|
|
2018-02-04 20:22:54 -05:00
|
|
|
|
`signing.saml_messages`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
A list of SAML message types that should be signed or `*` to sign all messages.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
Each element in the list should be the local name of a SAML XML Element.
|
|
|
|
|
Supported element types are `AuthnRequest`, `LogoutRequest` and `LogoutResponse`.
|
|
|
|
|
Only valid if `signing.key` or `signing.keystore.path` is also specified.
|
|
|
|
|
Defaults to `*`.
|
|
|
|
|
|
|
|
|
|
`signing.key`::
|
|
|
|
|
Specifies the path to the PEM encoded private key to use for SAML message signing.
|
2018-05-01 14:53:11 -04:00
|
|
|
|
`signing.key` and `signing.keystore.path` cannot be used at the same time.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`signing.secure_key_passphrase` (<<secure-settings,Secure>>)::
|
|
|
|
|
Specifies the passphrase to decrypt the PEM encoded private key (`signing.key`)
|
|
|
|
|
if it is encrypted.
|
|
|
|
|
|
|
|
|
|
`signing.certificate`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies the path to the PEM encoded certificate (or certificate chain) that
|
|
|
|
|
corresponds to the `signing.key`. This certificate must also be included in the
|
|
|
|
|
Service Provider metadata or manually configured within the IdP to allow for
|
|
|
|
|
signature validation. This setting can only be used if `signing.key` is set.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`signing.keystore.path`::
|
|
|
|
|
The path to the keystore that contains a private key and certificate.
|
|
|
|
|
Must be either a Java Keystore (jks) or a PKCS#12 file.
|
2018-05-01 14:53:11 -04:00
|
|
|
|
`signing.key` and `signing.keystore.path` cannot be used at the same time.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`signing.keystore.type`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The type of the keystore in `signing.keystore.path`.
|
|
|
|
|
Must be either `jks` or `PKCS12`. If the keystore path ends in ".p12", ".pfx",
|
|
|
|
|
or "pkcs12", this setting defaults to `PKCS12`. Otherwise, it defaults to `jks`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`signing.keystore.alias`::
|
|
|
|
|
Specifies the alias of the key within the keystore that should be
|
2018-05-01 14:53:11 -04:00
|
|
|
|
used for SAML message signing. If the keystore contains more than one private
|
|
|
|
|
key, this setting must be specified.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`signing.keystore.secure_password` (<<secure-settings,Secure>>)::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The password to the keystore in `signing.keystore.path`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`signing.keystore.secure_key_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
The password for the key in the keystore (`signing.keystore.path`).
|
|
|
|
|
Defaults to the keystore password.
|
|
|
|
|
|
2018-05-01 14:53:11 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[ref-saml-encryption-settings]]
|
|
|
|
|
===== SAML realm encryption settings
|
|
|
|
|
|
|
|
|
|
If an encryption key is configured (that is, either `encryption.key` or
|
|
|
|
|
`encryption.keystore.path` is set), then {security} publishes an encryption
|
|
|
|
|
certificate when generating metadata and attempts to decrypt incoming SAML
|
|
|
|
|
content. Encryption can be configured using the following settings:
|
|
|
|
|
|
2018-02-04 20:22:54 -05:00
|
|
|
|
`encryption.key`::
|
|
|
|
|
Specifies the path to the PEM encoded private key to use for SAML message
|
|
|
|
|
decryption.
|
2018-05-01 14:53:11 -04:00
|
|
|
|
`encryption.key` and `encryption.keystore.path` cannot be used at the same time.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`encryption.secure_key_passphrase` (<<secure-settings,Secure>>)::
|
|
|
|
|
Specifies the passphrase to decrypt the PEM encoded private key
|
|
|
|
|
(`encryption.key`) if it is encrypted.
|
|
|
|
|
|
|
|
|
|
`encryption.certificate`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies the path to the PEM encoded certificate (or certificate chain) that is
|
|
|
|
|
associated with the `encryption.key`. This certificate must also be included in
|
|
|
|
|
the Service Provider metadata or manually configured within the IdP to enable
|
|
|
|
|
message encryption. This setting can be used only if `encryption.key` is set.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`encryption.keystore.path`::
|
|
|
|
|
The path to the keystore that contains a private key and certificate.
|
|
|
|
|
Must be either a Java Keystore (jks) or a PKCS#12 file.
|
2018-05-01 14:53:11 -04:00
|
|
|
|
`encryption.key` and `encryption.keystore.path` cannot be used at the same time.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`encryption.keystore.type`::
|
|
|
|
|
The type of the keystore (`encryption.keystore.path`).
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Must be either `jks` or `PKCS12`. If the keystore path ends in ".p12", ".pfx",
|
|
|
|
|
or "pkcs12", this setting defaults to `PKCS12`. Otherwise, it defaults to `jks`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`encryption.keystore.alias`::
|
|
|
|
|
Specifies the alias of the key within the keystore (`encryption.keystore.path`)
|
2018-04-16 03:17:39 -04:00
|
|
|
|
that should be used for SAML message decryption. If not specified, all compatible
|
2018-05-01 14:53:11 -04:00
|
|
|
|
key pairs from the keystore are considered as candidate keys for decryption.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`encryption.keystore.secure_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
The password to the keystore (`encryption.keystore.path`).
|
|
|
|
|
|
|
|
|
|
`encryption.keystore.secure_key_password` (<<secure-settings,Secure>>)::
|
2018-04-16 03:17:39 -04:00
|
|
|
|
The password for the key in the keystore (`encryption.keystore.path`). Only a
|
2018-05-01 14:53:11 -04:00
|
|
|
|
single password is supported. If you are using multiple decryption keys,
|
2018-04-16 03:17:39 -04:00
|
|
|
|
they cannot have individual passwords.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
2018-05-01 14:53:11 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[ref-saml-ssl-settings]]
|
|
|
|
|
===== SAML realm SSL settings
|
|
|
|
|
|
|
|
|
|
If you are loading the IdP metadata over SSL/TLS (that is, `idp.metadata.path`
|
|
|
|
|
is a URL using the `https` protocol), the following settings can be used to
|
|
|
|
|
configure SSL. If these are not specified, then the
|
|
|
|
|
<<ssl-tls-settings,default SSL settings>> are used.
|
|
|
|
|
|
|
|
|
|
NOTE: These settings are not used for any purpose other than loading metadata
|
|
|
|
|
over https.
|
|
|
|
|
|
2018-02-04 20:22:54 -05:00
|
|
|
|
`ssl.key`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies the path to the PEM encoded private key to use for http client
|
|
|
|
|
authentication (if required). `ssl.key` and `ssl.keystore.path` cannot be used
|
|
|
|
|
at the same time.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.key_passphrase`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies the
|
2018-02-04 20:22:54 -05:00
|
|
|
|
passphrase to decrypt the PEM encoded private key (`ssl.key`) if it is
|
2018-05-01 14:53:11 -04:00
|
|
|
|
encrypted. Cannot be used with `ssl.secure_key_passphrase`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.secure_key_passphrase` (<<secure-settings,Secure>>)::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies the
|
2018-02-04 20:22:54 -05:00
|
|
|
|
passphrase to decrypt the PEM encoded private key (`ssl.key`) if it is
|
2018-05-01 14:53:11 -04:00
|
|
|
|
encrypted. Cannot be used with `ssl.key_passphrase`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.certificate`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies the
|
2018-02-04 20:22:54 -05:00
|
|
|
|
path to the PEM encoded certificate (or certificate chain) that is associated
|
2018-05-01 14:53:11 -04:00
|
|
|
|
with the key (`ssl.key`). This setting can be used only if `ssl.key` is set.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.certificate_authorities`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies the
|
2018-02-04 20:22:54 -05:00
|
|
|
|
paths to the PEM encoded certificate authority certificates that should be
|
2018-05-01 14:53:11 -04:00
|
|
|
|
trusted. `ssl.certificate_authorities` and `ssl.truststore.path` cannot be
|
2018-02-04 20:22:54 -05:00
|
|
|
|
used at the same time.
|
|
|
|
|
|
|
|
|
|
`ssl.keystore.path`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies the path to
|
2018-02-04 20:22:54 -05:00
|
|
|
|
the keystore that contains a private key and certificate.
|
|
|
|
|
Must be either a Java Keystore (jks) or a PKCS#12 file.
|
2018-05-01 14:53:11 -04:00
|
|
|
|
`ssl.key` and `ssl.keystore.path` cannot be used at the same time.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.keystore.type`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The type of the keystore (`ssl.keystore.path`). Must be either `jks` or `PKCS12`.
|
|
|
|
|
If the keystore path ends in ".p12", ".pfx" or "pkcs12", this setting defaults
|
|
|
|
|
to `PKCS12`. Otherwise, it defaults to `jks`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.keystore.password`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The password to the keystore (`ssl.keystore.path`). This setting cannot be used
|
|
|
|
|
with `ssl.keystore.secure_password`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.keystore.secure_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
The password to the keystore (`ssl.keystore.path`).
|
2018-05-01 14:53:11 -04:00
|
|
|
|
This setting cannot be used with `ssl.keystore.password`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.keystore.key_password`::
|
|
|
|
|
The password for the key in the keystore (`ssl.keystore.path`).
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Defaults to the keystore password. This setting cannot be used with
|
|
|
|
|
`ssl.keystore.secure_key_password`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.keystore.secure_key_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
The password for the key in the keystore (`ssl.keystore.path`).
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Defaults to the keystore password. This setting cannot be used with
|
|
|
|
|
`ssl.keystore.key_password`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.truststore.path`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The path to the
|
2018-02-04 20:22:54 -05:00
|
|
|
|
keystore that contains the certificates to trust.
|
|
|
|
|
Must be either a Java Keystore (jks) or a PKCS#12 file.
|
2018-05-01 14:53:11 -04:00
|
|
|
|
`ssl.certificate_authorities` and `ssl.truststore.path` cannot be used at the
|
2018-02-04 20:22:54 -05:00
|
|
|
|
same time.
|
|
|
|
|
|
|
|
|
|
`ssl.truststore.type`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The type of the truststore (`ssl.truststore.path`). Must be either `jks` or
|
|
|
|
|
`PKCS12`. If the keystore path ends in ".p12", ".pfx" or "pkcs12", this setting
|
|
|
|
|
defaults to `PKCS12`. Otherwise, it defaults to `jks`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.truststore.password`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The password to the truststore (`ssl.truststore.path`). This setting cannot be
|
|
|
|
|
used with `ssl.truststore.secure_password`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.truststore.secure_password` (<<secure-settings,Secure>>)::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
The password to the truststore (`ssl.truststore.path`). This setting cannot be
|
|
|
|
|
used with `ssl.truststore.password`.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.verification_mode`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
One of `full`
|
|
|
|
|
(verify the hostname and the certificate path), `certificate` (verify the
|
2018-02-04 20:22:54 -05:00
|
|
|
|
certificate path, but not the hostname) or `none` (perform no verification).
|
|
|
|
|
Defaults to `full`.
|
2018-04-10 06:27:23 -04:00
|
|
|
|
+
|
|
|
|
|
See <<ssl-tls-settings,`xpack.ssl.verification_mode`>> for a more detailed
|
|
|
|
|
explanation of these values.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.supported_protocols`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies the supported protocols for TLS/SSL.
|
2018-02-04 20:22:54 -05:00
|
|
|
|
|
|
|
|
|
`ssl.cipher_suites`::
|
2018-05-01 14:53:11 -04:00
|
|
|
|
Specifies the
|
2018-02-04 20:22:54 -05:00
|
|
|
|
cipher suites that should be supported.
|
|
|
|
|
|
2018-08-20 03:23:14 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[ref-kerberos-settings]]
|
|
|
|
|
===== Kerberos realm settings
|
|
|
|
|
|
|
|
|
|
For a Kerberos realm, the `type` must be set to `kerberos`. In addition to the
|
|
|
|
|
<<ref-realm-settings,settings that are valid for all realms>>, you can specify
|
|
|
|
|
the following settings:
|
|
|
|
|
|
|
|
|
|
`keytab.path`:: Specifies the path to the Kerberos keytab file that contains the
|
|
|
|
|
service principal used by this {es} node. This must be a location within the
|
|
|
|
|
{es} configuration directory and the file must have read permissions. Required.
|
|
|
|
|
|
|
|
|
|
`remove_realm_name`:: Set to `true` to remove the realm part of principal names.
|
|
|
|
|
Principal names in Kerberos have the form `user/instance@REALM`. If this option
|
|
|
|
|
is `true`, the realm part (`@REALM`) will not be included in the username.
|
|
|
|
|
Defaults to `false`.
|
|
|
|
|
|
|
|
|
|
`krb.debug`:: Set to `true` to enable debug logs for the Java login module that
|
|
|
|
|
provides support for Kerberos authentication. Defaults to `false`.
|
|
|
|
|
|
|
|
|
|
`cache.ttl`:: The time-to-live for cached user entries. A user is cached for
|
|
|
|
|
this period of time. Specify the time period using the standard {es}
|
|
|
|
|
<<time-units,time units>>. Defaults to `20m`.
|
|
|
|
|
|
|
|
|
|
`cache.max_users`:: The maximum number of user entries that can live in the
|
|
|
|
|
cache at any given time. Defaults to 100,000.
|
|
|
|
|
|
2018-04-30 11:04:15 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[load-balancing]]
|
|
|
|
|
===== Load balancing and failover
|
|
|
|
|
|
|
|
|
|
The `load_balance.type` setting can have the following values:
|
|
|
|
|
|
|
|
|
|
* `failover`: The URLs specified are used in the order that they are specified.
|
|
|
|
|
The first server that can be connected to will be used for all subsequent
|
|
|
|
|
connections. If a connection to that server fails then the next server that a
|
|
|
|
|
connection can be established to will be used for subsequent connections.
|
|
|
|
|
* `dns_failover`: In this mode of operation, only a single URL may be specified.
|
|
|
|
|
This URL must contain a DNS name. The system will be queried for all IP
|
|
|
|
|
addresses that correspond to this DNS name. Connections to the Active Directory
|
|
|
|
|
or LDAP server will always be tried in the order in which they were retrieved.
|
|
|
|
|
This differs from `failover` in that there is no reordering of the list and if a
|
|
|
|
|
server has failed at the beginning of the list, it will still be tried for each
|
|
|
|
|
subsequent connection.
|
|
|
|
|
* `round_robin`: Connections will continuously iterate through the list of
|
|
|
|
|
provided URLs. If a server is unavailable, iterating through the list of URLs
|
|
|
|
|
will continue until a successful connection is made.
|
|
|
|
|
* `dns_round_robin`: In this mode of operation, only a single URL may be
|
|
|
|
|
specified. This URL must contain a DNS name. The system will be queried for all
|
|
|
|
|
IP addresses that correspond to this DNS name. Connections will continuously
|
|
|
|
|
iterate through the list of addresses. If a server is unavailable, iterating
|
|
|
|
|
through the list of URLs will continue until a successful connection is made.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[ssl-tls-settings]]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
==== Default TLS/SSL settings
|
2017-06-27 12:14:35 -04:00
|
|
|
|
You can configure the following TLS/SSL settings in
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`elasticsearch.yml`. For more information, see
|
2018-04-27 15:40:05 -04:00
|
|
|
|
{xpack-ref}/encrypting-communications.html[Encrypting communications]. These settings will be used
|
2017-04-06 20:34:23 -04:00
|
|
|
|
for all of {xpack} unless they have been overridden by more specific
|
|
|
|
|
settings such as those for HTTP or Transport.
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.supported_protocols`::
|
|
|
|
|
Supported protocols with versions. Valid protocols: `SSLv2Hello`,
|
|
|
|
|
`SSLv3`, `TLSv1`, `TLSv1.1`, `TLSv1.2`. Defaults to `TLSv1.2`, `TLSv1.1`,
|
|
|
|
|
`TLSv1`.
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.client_authentication`::
|
|
|
|
|
Controls the server's behavior in regard to requesting a certificate
|
|
|
|
|
from client connections. Valid values are `required`, `optional`, and `none`.
|
|
|
|
|
`required` forces a client to present a certificate, while `optional`
|
|
|
|
|
requests a client certificate but the client is not required to present one.
|
2018-03-20 03:45:36 -04:00
|
|
|
|
Defaults to `required`. This global setting is not applicable for HTTP, see
|
|
|
|
|
<<http-tls-ssl-settings>>.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`xpack.ssl.verification_mode`::
|
2018-04-10 06:27:23 -04:00
|
|
|
|
Controls the verification of certificates. Valid values are:
|
|
|
|
|
- `full`, which verifies that the provided certificate is signed by a trusted
|
|
|
|
|
authority (CA) and also verifies that the server's hostname (or IP
|
|
|
|
|
address) matches the names identified within the certificate.
|
|
|
|
|
- `certificate`, which verifies that the provided certificate is signed by a
|
|
|
|
|
trusted authority (CA), but does not perform any hostname verification.
|
|
|
|
|
- `none`, which performs _no verification_ of the server's certificate. This mode
|
|
|
|
|
disables many of the security benefits of SSL/TLS and should only be
|
|
|
|
|
used after very careful consideration. It is primarily intended as a
|
|
|
|
|
temporary diagnostic mechanism when attempting to resolve TLS errors,
|
|
|
|
|
and its use on production clusters is strongly discouraged.
|
|
|
|
|
+
|
|
|
|
|
The default value is `full`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`xpack.ssl.cipher_suites`::
|
2017-04-06 20:34:23 -04:00
|
|
|
|
Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html[
|
|
|
|
|
Java Cryptography Architecture documentation]. Defaults to `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`,
|
|
|
|
|
`TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA`, `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`,
|
2017-08-01 09:36:35 -04:00
|
|
|
|
`TLS_RSA_WITH_AES_128_CBC_SHA256`, `TLS_RSA_WITH_AES_128_CBC_SHA`. If the _Java Cryptography Extension (JCE) Unlimited Strength
|
|
|
|
|
Jurisdiction Policy Files_ has been installed, the default value also includes `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384`,
|
|
|
|
|
`TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384`, `TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA`, `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA`,
|
|
|
|
|
`TLS_RSA_WITH_AES_256_CBC_SHA256`, `TLS_RSA_WITH_AES_256_CBC_SHA`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
[float]
|
|
|
|
|
[[tls-ssl-key-settings]]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
===== Default TLS/SSL key and trusted certificate settings
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
The following settings are used to specify a private key, certificate, and the
|
|
|
|
|
trusted certificates that should be used when communicating over an SSL/TLS connection.
|
|
|
|
|
If none of the settings below are specified, this will default to the <<ssl-tls-settings, {xpack}
|
|
|
|
|
defaults>>. If no trusted certificates are configured, the default certificates that are trusted by the JVM will be
|
|
|
|
|
trusted along with the certificate(s) from the <<tls-ssl-key-settings, key settings>>. The key and certificate must be in place
|
|
|
|
|
for connections that require client authentication or when acting as a SSL enabled server.
|
|
|
|
|
|
|
|
|
|
[float]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
===== PEM encoded files
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
When using PEM encoded files, use the following settings:
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.key`::
|
|
|
|
|
Path to the PEM encoded file containing the private key.
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.key_passphrase`::
|
2017-10-24 11:38:37 -04:00
|
|
|
|
The passphrase that is used to decrypt the private key. This value is
|
|
|
|
|
optional as the key might not be encrypted.
|
|
|
|
|
|
2018-05-23 19:41:04 -04:00
|
|
|
|
`xpack.ssl.secure_key_passphrase` (<<secure-settings,Secure>>)::
|
2017-10-24 11:38:37 -04:00
|
|
|
|
The passphrase that is used to decrypt the private key. This value is
|
|
|
|
|
optional as the key might not be encrypted.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`xpack.ssl.certificate`::
|
|
|
|
|
Path to a PEM encoded file containing the certificate (or certificate chain)
|
|
|
|
|
that will be presented to clients when they connect.
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.certificate_authorities`::
|
|
|
|
|
List of paths to the PEM encoded certificate files that should be trusted.
|
|
|
|
|
|
|
|
|
|
[float]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
===== Java keystore files
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
When using Java keystore files (JKS), which contain the private key, certificate
|
|
|
|
|
and certificates that should be trusted, use the following settings:
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.keystore.path`::
|
|
|
|
|
Path to the keystore that holds the private key and certificate.
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.keystore.password`::
|
|
|
|
|
Password to the keystore.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`xpack.ssl.keystore.secure_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
Password to the keystore.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`xpack.ssl.keystore.key_password`::
|
|
|
|
|
Password for the private key in the keystore. Defaults to the
|
|
|
|
|
same value as `xpack.ssl.keystore.password`.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`xpack.ssl.keystore.secure_key_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
Password for the private key in the keystore.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
`xpack.ssl.truststore.path`::
|
|
|
|
|
Path to the truststore file.
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.truststore.password`::
|
|
|
|
|
Password to the truststore.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`xpack.ssl.truststore.secure_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
Password to the truststore.
|
|
|
|
|
|
2017-07-25 03:31:37 -04:00
|
|
|
|
[float]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
===== PKCS#12 files
|
2017-07-25 03:31:37 -04:00
|
|
|
|
|
|
|
|
|
When using PKCS#12 container files (`.p12` or `.pfx`), which contain the
|
|
|
|
|
private key, certificate, and certificates that should be trusted, use
|
|
|
|
|
the following settings:
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.keystore.path`::
|
|
|
|
|
Path to the PKCS#12 file that holds the private key and certificate.
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.keystore.type`::
|
|
|
|
|
Set this to `PKCS12`.
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.keystore.password`::
|
|
|
|
|
Password to the PKCS#12 file.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`xpack.ssl.keystore.secure_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
Password to the PKCS#12 file.
|
|
|
|
|
|
2017-07-25 03:31:37 -04:00
|
|
|
|
`xpack.ssl.keystore.key_password`::
|
|
|
|
|
Password for the private key in the PKCS12 file.
|
|
|
|
|
Defaults to the same value as `xpack.ssl.keystore.password`.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`xpack.ssl.keystore.secure_key_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
Password for the private key in the PKCS12 file.
|
|
|
|
|
|
2017-07-25 03:31:37 -04:00
|
|
|
|
`xpack.ssl.truststore.path`::
|
|
|
|
|
Path to the truststore file.
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.truststore.type`::
|
|
|
|
|
Set this to `PKCS12`.
|
|
|
|
|
|
|
|
|
|
`xpack.ssl.truststore.password`::
|
|
|
|
|
Password to the truststore.
|
|
|
|
|
|
2017-10-24 11:38:37 -04:00
|
|
|
|
`xpack.ssl.truststore.secure_password` (<<secure-settings,Secure>>)::
|
|
|
|
|
Password to the truststore.
|
|
|
|
|
|
2018-05-31 14:49:27 -04:00
|
|
|
|
[[pkcs12-truststore-note]]
|
|
|
|
|
[NOTE]
|
|
|
|
|
Storing trusted certificates in a PKCS#12 file, although supported, is
|
|
|
|
|
uncommon in practice. The {ref}/certutil.html[`elasticsearch-certutil`] tool,
|
|
|
|
|
as well as Java's `keytool`, are designed to generate PKCS#12 files that
|
|
|
|
|
can be used both as a keystore and as a truststore, but this may not be the
|
|
|
|
|
case for container files that are created using other tools. Usually,
|
|
|
|
|
PKCS#12 files only contain secret and private entries. To confirm that
|
|
|
|
|
a PKCS#12 container includes trusted certificate ("anchor") entries look for
|
|
|
|
|
`2.16.840.1.113894.746875.1.1: <Unsupported tag 6>` in the
|
|
|
|
|
`openssl pkcs12 -info` output, or `trustedCertEntry` in the
|
|
|
|
|
`keytool -list` output.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
[[http-tls-ssl-settings]]
|
|
|
|
|
:ssl-prefix: xpack.security.http
|
|
|
|
|
:component: HTTP
|
|
|
|
|
:client-auth-default: none
|
|
|
|
|
:verifies!:
|
|
|
|
|
:server:
|
|
|
|
|
|
|
|
|
|
include::ssl-settings.asciidoc[]
|
|
|
|
|
|
|
|
|
|
[[transport-tls-ssl-settings]]
|
|
|
|
|
:ssl-prefix: xpack.security.transport
|
|
|
|
|
:component: Transport
|
|
|
|
|
:client-auth-default!:
|
|
|
|
|
:verifies:
|
|
|
|
|
:server:
|
|
|
|
|
|
|
|
|
|
include::ssl-settings.asciidoc[]
|
|
|
|
|
|
|
|
|
|
[[ssl-tls-profile-settings]]
|
|
|
|
|
[float]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
===== Transport profile TLS/SSL settings
|
2017-04-06 20:34:23 -04:00
|
|
|
|
The same settings that are available for the <<transport-tls-ssl-settings, default transport>>
|
|
|
|
|
are also available for each transport profile. By default, the settings for a
|
|
|
|
|
transport profile will be the same as the default transport unless they
|
|
|
|
|
are specified.
|
|
|
|
|
|
2017-09-15 10:44:03 -04:00
|
|
|
|
As an example, lets look at the key setting. For the default transport
|
|
|
|
|
this is `xpack.security.transport.ssl.key`. In order to use this setting in a
|
2017-04-06 20:34:23 -04:00
|
|
|
|
transport profile, use the prefix `transport.profiles.$PROFILE.xpack.security.` and
|
2017-09-15 10:44:03 -04:00
|
|
|
|
append the portion of the setting after `xpack.security.transport.`. For the key
|
|
|
|
|
setting, this would be `transport.profiles.$PROFILE.xpack.security.ssl.key`.
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
2018-05-29 18:53:19 -04:00
|
|
|
|
[[auditing-tls-ssl-settings]]
|
|
|
|
|
:ssl-prefix: xpack.security.audit.index.client.xpack
|
|
|
|
|
:component: Auditing
|
|
|
|
|
:client-auth-default!:
|
|
|
|
|
:server!:
|
|
|
|
|
|
|
|
|
|
include::ssl-settings.asciidoc[]
|
|
|
|
|
|
|
|
|
|
See also <<remote-audit-settings>>.
|
|
|
|
|
|
2017-04-06 20:34:23 -04:00
|
|
|
|
[float]
|
|
|
|
|
[[ip-filtering-settings]]
|
2018-04-27 15:40:05 -04:00
|
|
|
|
==== IP filtering settings
|
2017-06-26 13:35:25 -04:00
|
|
|
|
You can configure the following settings for {xpack-ref}/ip-filtering.html[IP filtering].
|
2017-04-06 20:34:23 -04:00
|
|
|
|
|
|
|
|
|
`xpack.security.transport.filter.allow`::
|
|
|
|
|
List of IP addresses to allow.
|
|
|
|
|
|
|
|
|
|
`xpack.security.transport.filter.deny`::
|
|
|
|
|
List of IP addresses to deny.
|
|
|
|
|
|
|
|
|
|
`xpack.security.http.filter.allow`::
|
|
|
|
|
List of IP addresses to allow just for HTTP.
|
|
|
|
|
|
|
|
|
|
`xpack.security.http.filter.deny`::
|
|
|
|
|
List of IP addresses to deny just for HTTP.
|
|
|
|
|
|
|
|
|
|
`transport.profiles.$PROFILE.xpack.security.filter.allow`::
|
|
|
|
|
List of IP addresses to allow for this profile.
|
|
|
|
|
|
|
|
|
|
`transport.profiles.$PROFILE.xpack.security.filter.deny`::
|
|
|
|
|
List of IP addresses to deny for this profile.
|
2018-08-21 05:05:42 -04:00
|
|
|
|
|
|
|
|
|
include::security-hash-settings.asciidoc[]
|