Przeglądaj źródła

[DOCS] Adding redirect for cross-link from Cloud (#73351) (#73383)

Adam Locke 4 lat temu
rodzic
commit
13b8715a56

+ 5 - 0
docs/reference/redirects.asciidoc

@@ -36,6 +36,11 @@ See <<secure-cluster,Secure the Elastic Stack>>.
 
 See <<oidc-elasticsearch-authentication,Configure {es} for OpenID Connect authentication>>.
 
+[role="exclude",id="oidc-claims-mapping"]
+==== Claims mapping
+
+See <<oidc-claims-mappings,Claims mapping for OpenID Connect>>.
+
 [role="exclude",id="oidc-kibana"]
 === Configuring {kib}
 

+ 3 - 3
x-pack/docs/en/security/authentication/oidc-guide.asciidoc

@@ -183,8 +183,8 @@ rp.post_logout_redirect_uri::
     will not trigger a new OpenID Connect Authentication, such as +$\{kibana-url}/security/logged_out+  or
     +$\{kibana-url}/login?msg=LOGGED_OUT+ where _$\{kibana-url}_ is the base URL for your {kib} instance.
 
-claims.principal:: See <<oidc-claims-mapping>>.
-claims.groups:: See <<oidc-claims-mapping>>.
+claims.principal:: See <<oidc-claims-mappings>>.
+claims.groups:: See <<oidc-claims-mappings>>.
 
 A final piece of configuration of the OpenID Connect realm is to set the `Client Secret` that was assigned
 to the RP during registration in the OP. This is a secure setting and as such is not defined in the realm
@@ -205,7 +205,7 @@ available at a well known URL, which is the concatenation of their `Issuer` valu
 That document should contain all the necessary information to configure the OpenID Connect realm in {es}.
 
 
-[[oidc-claims-mapping]]
+[[oidc-claims-mappings]]
 ==== Claims mapping
 
 ===== Claims and scopes