From d6d13661e8da8bde7f383bcd82bd1257a54481f2 Mon Sep 17 00:00:00 2001 From: Clinton Gormley Date: Thu, 16 Jul 2015 10:46:52 +0200 Subject: [PATCH] Docs: Fix bad ID in Shield intro Original commit: elastic/x-pack-elasticsearch@61b72d57aeda7fea1e0f0b6b4867dfb266a41d03 --- shield/docs/public/introduction.asciidoc | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/shield/docs/public/introduction.asciidoc b/shield/docs/public/introduction.asciidoc index 341767e5209..8bfcfd74589 100644 --- a/shield/docs/public/introduction.asciidoc +++ b/shield/docs/public/introduction.asciidoc @@ -2,8 +2,8 @@ == Introduction _Shield_ is a plugin for Elasticsearch that enables you to easily secure a cluster. With Shield, -you can password-protect your data as well as implement more advanced security measures such as encrypting communications, role-based access control, IP filtering, and auditing. This guide -describes how to install Shield, configure the security features you need, and interact with your secured cluster. +you can password-protect your data as well as implement more advanced security measures such as encrypting communications, role-based access control, IP filtering, and auditing. This guide +describes how to install Shield, configure the security features you need, and interact with your secured cluster. [float] === Security for Elasticsearch @@ -12,17 +12,17 @@ Shield protects Elasticsearch clusters by: * <> with password protection, role-based access control, and IP filtering. * <> with message authentication and SSL/TLS encryption. -* <> so you know who's doing what to your +* <> so you know who's doing what to your data. [float] -[[preventing-unauthortized-access]] +[[preventing-unauthorized-access]] ==== Preventing Unauthorized Access -To prevent unauthorized access to your Elasticsearch cluster, you must have a way to _authenticate_ users. This simply means that you need a way to validate that a user is who they claim to be. For example, you have to make sure only the person named _Kelsey Andorra_ can sign in as the user `kandorra`. Shield provides a standalone authentication mechanism that enables you to quickly <>. If you're already using <>, <>, or <>, Shield easily integrates with those systems to perform user authentication. +To prevent unauthorized access to your Elasticsearch cluster, you must have a way to _authenticate_ users. This simply means that you need a way to validate that a user is who they claim to be. For example, you have to make sure only the person named _Kelsey Andorra_ can sign in as the user `kandorra`. Shield provides a standalone authentication mechanism that enables you to quickly <>. If you're already using <>, <>, or <>, Shield easily integrates with those systems to perform user authentication. -In many cases, simply authenticating users isn't enough. You also need a way to control what data users have access to and what tasks they can perform. Shield enables you to _authorize_ users by -assigning access _privileges_ to a _role_, and assigning those roles to users. For example, this <> mechanism enables you to specify that the user `kandorra`can only perform read operations on the `events` index and can't do anything at all with other indices. +In many cases, simply authenticating users isn't enough. You also need a way to control what data users have access to and what tasks they can perform. Shield enables you to _authorize_ users by +assigning access _privileges_ to a _role_, and assigning those roles to users. For example, this <> mechanism enables you to specify that the user `kandorra`can only perform read operations on the `events` index and can't do anything at all with other indices. Shield also supports <>. You can whitelist and blacklist specific IP addresses or subnets to control network-level access to a server. @@ -44,7 +44,7 @@ Keeping a system secure takes vigilance. By using Shield to maintain an audit tr * <> steps through how to install and start using Shield for basic authentication. * <> provides more information about how Shield supports user authentication, authorization, and encryption. -* <> shows you how to +* <> shows you how to interact with an Elasticsearch cluster protected by Shield. * <> provides detailed information about the access privileges you can grant to users, the settings you can configure for Shield in `elasticsearch.yml`, and the files where Shield configuration information is stored.