Commit graph

35 commits

Author SHA1 Message Date
florent-leborgne
0c500e5264
Remove Beta label for RCS2.0 from 8.14 (#108030) 2024-05-02 15:43:21 +02:00
shainaraskas
164fcf091b
unhide setting (#107019) 2024-04-25 08:26:40 -04:00
Mary Gouseti
2122da31cd
[DSL] Introduce data stream global retention - Part 3 (#105682)
In this PR we introduce the API that will expose the global retention configuration and will allow users to take advantage of it.

These APIs are protected by the dedicated introduced privileges:

`manage_data_stream_global_retention` or higher, which allows all operations on the global retention configuration
`monitor_data_stream_retention` or higher, which allows the retrieval of the global retention configuration.

This PR is the final PR that makes the global retention available for our users.
2024-03-28 10:40:33 +02:00
David Kyle
2087b65523
[ML] Create inference_user and inference_admin roles (#106371)
Defines new inference_user and inference_admin roles with the 
related cluster privileges manage_inference and monitor_inference.
inference_user can list the models and preform inference, 
inference_admin can do the same plus create and delete models
2024-03-20 11:15:21 +00:00
Athena Brown
d5565b618a
Fix typo in OIDC docs (#106207) (#106517)
Add missing _to_ in sentence

(cherry picked from commit 40a9155b3b)

Co-authored-by: Aaron Hanusa <aaron.hanusa@gmail.com>
2024-03-19 19:08:41 -04:00
Jake Landis
b22d2af669
OIDC doc - mention client secret needs a restart (#106088) 2024-03-07 14:59:02 -06:00
Jake Landis
5b80065dfe
Update FIPS documentation for 8.x (#105041)
This commit updates the documentation for FIPS support. 
In addition to the changes for 8.x it also provides more details for how to setup/configure FIPS mode.
2024-02-15 09:23:48 -06:00
Jake Landis
78c6a7c4bb
security-minimal-setup.asciidoc: replace KIB_PATH_CONF by KBN_PATH_CONF (#104582) (#104631)
Co-authored-by: Fabien Baligand <fbaligand@gmail.com>
2024-01-22 16:43:03 -05:00
Johannes Fredén
cc9fba36e6
Add ApiKey expiration time to audit log (#103959)
Follow up to PR: https://github.com/elastic/elasticsearch/pull/103453
2024-01-11 04:40:52 -05:00
Jake Landis
15258c8688
Minor doc fixes for PKI realm (#103831)
Remove the reference to the transport client and clarify the usage of username_pattern
2024-01-09 09:49:59 -06:00
Johannes Fredén
39d9ce8f89
[DOCS] Update SAML guide to reference attribute_delimiters.group (#103102)
This is a follow up PR from
https://github.com/elastic/elasticsearch/pull/102769. The SAML realm can
now be configured to split the `groups` attribute by delimiter, this
updates the docs to mention that.
2023-12-08 05:11:11 -05:00
Albert Zaharovits
f64bb49055
Patterns support for allowed subjects by the JWT realm (#102426)
This adds support for allowing JWT token sub claims with Lucene patterns and wildcards,
by introducing a new JWT realm setting allowed_subject_patterns that can be used
alongside the exist allowed_subjects realm setting.
2023-12-05 12:23:34 +02:00
Albert Zaharovits
bd10775b02
Grant API Key API with JWTs (#101904)
Introduces support for JWTs to the grant API Key API.
Callers can now pass-in a JWT in the request, like:
POST /_security/api_key/grant
{
  "grant_type": "access_token",
  "access_token" : "some.signed.JWT",
  "client_authentication": { // optional
    "scheme": "SharedSecret",
    "value": "ES-Client-Authentication header value after scheme"
  }
}
The JWT will be authenticated by a backing JWT realm and
a new API Key will be returned for the authenticated user.
2023-11-21 14:11:08 +02:00
Jake Landis
1eaa907052
Fix manage/monitor_enrich documentation (#100781)
manage_enrich is a cluster privilege, not a built in role. 
manage_enrich is already documented as a cluster privilege.
This commit remove manage_enrich from the role documentation.
This commit also makes mention of the monitor_enrich introduced in #99646.

related: #85877
2023-10-13 11:29:48 -05:00
James Rodewig
255c9a7f95
[DOCS] Move x-pack docs to docs/reference dir (#99209)
**Problem:**
For historical reasons, source files for the Elasticsearch Guide's security, watcher, and Logstash API docs are housed in the `x-pack/docs` directory. This can confuse new contributors who expect Elasticsearch Guide docs to be located in `docs/reference`. 

**Solution:**
- Move the security, watcher, and Logstash API doc source files to the `docs/reference` directory
- Update doc snippet tests to use security

Rel: https://github.com/elastic/platform-docs-team/issues/208
2023-09-12 14:53:41 -04:00
Lisa Cawley
f7edcb0857
[DOCS] Fixes build errors (#47536) 2019-10-03 15:22:41 -07:00
Lisa Cawley
a827349714
[DOCS] Add security section to Elasticsearch book (#46883)
Co-Authored-By: Tim Vernum <tim@adjective.org>
2019-09-20 11:31:24 -07:00
James Rodewig
bd52e148c5
[DOCS] Remove :edit_url: overrides. (#44445)
These overrides do not work in Asciidoctor and are no longer needed.
2019-07-16 15:02:38 -04:00
Jay Modi
0a41b13cd8 Remove the client transport profile filter (#43236)
Now that the transport client has been removed, the client transport
profile filter can be removed from security. This filter prevented node
actions from being executed using a transport client.
2019-07-03 19:32:24 +10:00
Dimitrios Liappis
b42bcf5e9f
Update TLS configuration in Docker docs (#43748)
Following the removal of the `unzip` package from the Elasticsearch 
Docker image in #39040, update setup instructions for TLS in Docker.

Also avoid cross-platform ownership+permission issues by not relying
on local bind mounts for storing generated certs and don't require 
`curl` locally installed.
2019-07-01 14:38:29 +03:00
Lisa Cawley
6e307d9fee
[DOCS] Removes inclusion of java.asciidoc (#42459) 2019-05-23 14:05:38 -07:00
Lisa Cawley
9002be4e61
[DOCS] Updates TLS configuration info (#41983) 2019-05-20 09:06:42 -04:00
David Turner
cbed3fc75f
Fix discovery config in docker-compose docs (#41753)
Today's `docker-compose` docs are missing the `discovery.seed_nodes` config on
one of the nodes. With today's configuration the cluster can still form the
first time it is started, because `cluster.initial_master_nodes` requires both
nodes to bootstrap the cluster which ensures that each discover the other.
However if `es02` is elected master it will remove `es01` from the voting
configuration and then when restarted it will form a cluster on its own without
needing to do any discovery. Meanwhile `es01` doesn't know how to find `es02`
after a restart so will be unable to join this cluster.

This commit fixes this by adding the missing configuration.

Relates #41394, which fixes a different `docker-compose.yml` in the same way.
2019-05-03 10:45:51 +02:00
RomainGeffraye
00b9f5d1e4 Fix typo (#40273) 2019-03-21 07:54:11 -07:00
David Turner
2d114a02ff
Rename static Zen1 settings (#38333)
Renames the following settings to remove the mention of `zen` in their names:

- `discovery.zen.hosts_provider` -> `discovery.seed_providers`
- `discovery.zen.ping.unicast.concurrent_connects` -> `discovery.seed_resolver.max_concurrent_resolvers`
- `discovery.zen.ping.unicast.hosts.resolve_timeout` -> `discovery.seed_resolver.timeout`
- `discovery.zen.ping.unicast.hosts` -> `discovery.seed_addresses`
2019-02-05 08:46:52 +00:00
Jay Modi
f3edbe2911
Security: remove SSL settings fallback (#36846)
This commit removes the fallback for SSL settings. While this may be
seen as a non user friendly change, the intention behind this change
is to simplify the reasoning needed to understand what is actually
being used for a given SSL configuration. Each configuration now needs
to be explicitly specified as there is no global configuration or
fallback to some other configuration.

Closes #29797
2019-01-14 14:06:22 -07:00
David Turner
1a23417aeb
[Zen2] Update documentation for Zen2 (#34714)
This commit overhauls the documentation of discovery and cluster coordination,
removing mention of the Zen Discovery module and replacing it with docs for the
new cluster coordination mechanism introduced in 7.0.

Relates #32006
2018-12-20 13:02:44 +00:00
lcawl
8b8121279a [DOCS] Fix typos 2018-12-19 15:28:25 -08:00
Lisa Cawley
4140b9eede
[DOCS] Update X-Pack terminology in security docs (#36564) 2018-12-19 14:53:37 -08:00
lcawl
a8387592db [DOCS] Fixes broken links to tcp_tranport_profiles 2018-12-18 14:43:58 -08:00
Lisa Cawley
e1fb1505f9
[DOCS] Moves security config file info (#36232) 2018-12-04 13:18:54 -08:00
Toby McLaughlin
8006068873 [DOCS] Remove "platinum" references for Docker TLS (#35890) 2018-11-29 09:33:08 -08:00
Tim Vernum
574ec6686e
Include realm type in Security Realm setting keys (#30241)
This moves all Realm settings to an Affix definition.
However, because different realm types define different settings
(potentially conflicting settings) this requires that the realm type
become part of the setting key.

Thus, we now need to define realm settings as:

    xpack.security.authc.realms:
      file.file1:
        order: 0

      native.native1:
        order: 1

- This is a breaking change to realm config
- This is also a breaking change to custom security realms (SecurityExtension)
2018-11-06 14:56:50 +11:00
Lisa Cawley
9706584836
[DOCS] Moves security reference to docs folder (#33643) 2018-09-14 13:09:47 -07:00
Lisa Cawley
c3a817957d
[DOCS] Moves securing-communications to docs (#33640) 2018-09-13 10:42:26 -07:00