🔎 Open source distributed and RESTful search engine.
Go to file
uboness 956aeb53f4 Modified the initial authentication logic
When a http request arrives, we first verify that it carries an authentication token (if it doesn't we throw an authentication exception). Beyond that, any action request that arrives, if it doesn't have an authentication token we assume system user identity. The rationale behind it is that  if a request comes in via the transport, then the sending peer authenticated with a client auth cert (the cert acts as the guarantee here that the actor can be assumed as System)... otherwise, the request can come from the local node and triggered by the system (e.g. gateway recovery)

The System user only has permissions to internal apis (it doesn't have full access/permission to all the apis). when a System identity is assumed, the authorization service will grant/deny the request based on whether the request is an internal api or not.

Aso fixed the known actions (to be insync with 1.x branch)

Closes elastic/elasticsearch#45

Original commit: elastic/x-pack-elasticsearch@be27cb0e1b
2014-08-29 15:35:01 -07:00
src Modified the initial authentication logic 2014-08-29 15:35:01 -07:00
LICENSE.txt Initial X-Pack commit 2018-04-20 14:16:58 -07:00
README.asciidoc Docs: Added SSL certification/CA creation docs 2014-07-23 15:42:10 +02:00
all-signatures.txt Initial import 2014-07-07 11:30:28 +02:00
core-signatures.txt Build: Do not depend on guava in compile scope 2014-08-08 12:57:28 +02:00
pom.xml LDAP: Implements an LDAP realm 2014-08-25 15:36:31 -06:00
test-signatures.txt Initial import 2014-07-07 11:30:28 +02:00
tests.policy LDAP: Implements an LDAP realm 2014-08-25 15:36:31 -06:00

README.asciidoc

= Elasticsearch Security Plugin

This plugins adds security features to elasticsearch

You can build the plugin with `mvn package`.

The documentation is put in the `docs/` directory.