[[security-getting-started]] == Getting Started with Security To secure a cluster, you must enable {security} on every node in the cluster. Basic authentication is enabled by default--to communicate with the cluster, you must specify a username and password. Unless you {xpack-ref}/anonymous-access.html[enable anonymous access], all requests that don't include a user name and password are rejected. To get started with {security}: . {ref}/configuring-security.html[Configure security in {es}]. Encrypt inter-node communications, set passwords for the <>, and manage your users and roles. . {kibana-ref}/using-kibana-with-security.html[Configure security in {kib}]. Set the authentication credentials in {kib} and encrypt communications between the browser and the {kib} server. . {logstash-ref}/ls-security.html[Configure security in Logstash]. Set the authentication credentials for Logstash and encrypt communications between Logstash and {es}. . <>. Configure authentication credentials and encrypt connections to {es}. . Configure the Java transport client to use encrypted communications. See <>. . Configure {es} for Apache Hadoop to use secured transport. See {hadoop-ref}/security.html[{es} for Apache Hadoop Security]. Depending on your security requirements, you might also want to: * Integrate with {xpack-ref}/ldap-realm.html[LDAP] or {xpack-ref}/active-directory-realm.html[Active Directory], or {xpack-ref}/pki-realm.html[require certificates] for authentication. * Use {xpack-ref}/ip-filtering.html[IP Filtering] to allow or deny requests from particular IP addresses or address ranges.