Skip to content

Commit 477b0cc

Browse files
PKI authn in Kibana (elastic#485)
Co-Authored-By: Lisa Cawley <[email protected]>
1 parent 677d087 commit 477b0cc

1 file changed

Lines changed: 10 additions & 4 deletions

File tree

docs/en/stack/security/authentication/pki-realm.asciidoc

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,20 @@ You can configure {stack} {security-features} to use Public Key Infrastructure
66
(PKI) certificates to authenticate users in {es}. This requires clients to
77
present X.509 certificates.
88

9-
NOTE: You cannot use PKI certificates to authenticate users in {kib}.
9+
You can use PKI certificates to authenticate users in {es} as well as {kib}.
1010

1111
To use PKI in {es}, you configure a PKI realm, enable client authentication on
1212
the desired network layers (transport or http), and map the Distinguished Names
13-
(DNs) from the user certificates to roles in the
14-
<<mapping-roles, role mapping file>>.
13+
(DNs) from the user certificates to roles. You create the mappings in a <<pki-role-mapping, role
14+
mapping file>> or use the {ref}/security-api-put-role-mapping.html[create role mappings API]. If you want the same users to also be
15+
authenticated using certificates when they connect to {kib}, you must configure the {es} PKI
16+
realm to
17+
{ref}/configuring-pki-realm.html#pki-realm-for-proxied-clients[allow
18+
delegation] and to
19+
{kibana-ref}/kibana-authentication.html#pki-authentication[enable PKI
20+
authentication in {kib}].
1521

16-
See {ref}/configuring-pki-realm.html[Configuring a PKI realm].
22+
See also {ref}/configuring-pki-realm.html[Configuring a PKI realm].
1723

1824
[[pki-settings]]
1925
==== PKI realm settings

0 commit comments

Comments
 (0)