File tree Expand file tree Collapse file tree
docs/en/stack/security/authentication Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -6,14 +6,20 @@ You can configure {stack} {security-features} to use Public Key Infrastructure
66(PKI) certificates to authenticate users in {es}. This requires clients to
77present X.509 certificates.
88
9- NOTE: You cannot use PKI certificates to authenticate users in {kib}.
9+ You can use PKI certificates to authenticate users in {es} as well as {kib}.
1010
1111To use PKI in {es}, you configure a PKI realm, enable client authentication on
1212the desired network layers (transport or http), and map the Distinguished Names
13- (DNs) from the user certificates to roles in the
14- <<mapping-roles, role mapping file>>.
13+ (DNs) from the user certificates to roles. You create the mappings in a <<pki-role-mapping, role
14+ mapping file>> or use the {ref}/security-api-put-role-mapping.html[create role mappings API]. If you want the same users to also be
15+ authenticated using certificates when they connect to {kib}, you must configure the {es} PKI
16+ realm to
17+ {ref}/configuring-pki-realm.html#pki-realm-for-proxied-clients[allow
18+ delegation] and to
19+ {kibana-ref}/kibana-authentication.html#pki-authentication[enable PKI
20+ authentication in {kib}].
1521
16- See {ref}/configuring-pki-realm.html[Configuring a PKI realm].
22+ See also {ref}/configuring-pki-realm.html[Configuring a PKI realm].
1723
1824[[pki-settings]]
1925==== PKI realm settings
You can’t perform that action at this time.
0 commit comments