Browse Source

Clarify docs about CA fingerprints and Fleet (#84056)

Co-authored-by: James Rodewig <james.rodewig@elastic.co>
Co-authored-by: Ioannis Kakavas <ikakavas@protonmail.com>
DeDe Morton 3 years ago
parent
commit
08c0fcd91e
1 changed files with 11 additions and 10 deletions
  1. 11 10
      docs/reference/setup/install/connect-clients.asciidoc

+ 11 - 10
docs/reference/setup/install/connect-clients.asciidoc

@@ -1,13 +1,16 @@
 ==== Connect clients to {es}
 ==== Connect clients to {es}
 
 
-When you start {es} for the first time, TLS is configured automatically for the 
-HTTP layer. A CA certificate is generated and stored on disk, and the hex-coded 
-SHA-256 fingerprint of this certificate is also output to the terminal. Any 
-clients that connect to {es}, such as the 
+When you start {es} for the first time, TLS is configured automatically for the
+HTTP layer. A CA certificate is generated and stored on disk at
+`$ES_HOME/config/certs/http_ca.crt`. The hex-encoded SHA-256 fingerprint of this
+certificate is also output to the terminal. Any clients that connect to {es},
+such as the 
 https://www.elastic.co/guide/en/elasticsearch/client/index.html[{es} Clients],
 https://www.elastic.co/guide/en/elasticsearch/client/index.html[{es} Clients],
-{beats}, {ls}, and {fleet} must validate that they trust the certificate that
-{es} uses for HTTPS. Clients can establish trust by using either the fingerprint
-of the CA certificate or the CA certificate itself.
+{beats}, standalone {agent}s, and {ls} must validate that they trust the
+certificate that {es} uses for HTTPS. {fleet-server} and {fleet}-managed
+{agent}s are automatically configured to trust the CA certificate.
+Other clients can establish trust by using either the fingerprint of the CA
+certificate or the CA certificate itself.
 
 
 If the auto-configuration process already completed, you can still obtain the 
 If the auto-configuration process already completed, you can still obtain the 
 fingerprint of the security certificate. You can also copy the CA certificate
 fingerprint of the security certificate. You can also copy the CA certificate
@@ -29,8 +32,6 @@ path is to the auto-generated CA certificate for the HTTP layer.
 openssl x509 -fingerprint -sha256 -in config/certs/http_ca.crt
 openssl x509 -fingerprint -sha256 -in config/certs/http_ca.crt
 ----
 ----
 
 
-`<timestamp>`:: The timestamp of when the auto-configuration process created the security files directory.
-
 The command returns the security certificate, including the fingerprint.
 The command returns the security certificate, including the fingerprint.
 The `issuer` should be `Elasticsearch security auto-configuration HTTP CA`.
 The `issuer` should be `Elasticsearch security auto-configuration HTTP CA`.
 
 
@@ -45,6 +46,6 @@ SHA256 Fingerprint=<fingerprint>
 
 
 If your library doesn't support a method of validating the fingerprint, the 
 If your library doesn't support a method of validating the fingerprint, the 
 auto-generated CA certificate is created in the
 auto-generated CA certificate is created in the
-`config/certs` directory on each {es} node. Copy the
+`$ES_HOME/config/certs/` directory on each {es} node. Copy the
 `http_ca.crt` file to your machine and configure your client to use this
 `http_ca.crt` file to your machine and configure your client to use this
 certificate to establish trust when it connects to {es}.
 certificate to establish trust when it connects to {es}.