Browse Source

Adjust auto-configuration related docs (#84080)

* Add a note that the http_ca.crt certificate that is generated and
stored in config/certs can be used to configure any client to trust
the certificate that elasticsearch uses for TLS on the HTTP layer
* Add a note that the elasticsearch-create-enrollment-token CLI
tool can only be used with auto-configured TLS settings.
Ioannis Kakavas 3 years ago
parent
commit
6e530c0383

+ 4 - 0
docs/reference/commands/create-enrollment-token.asciidoc

@@ -18,11 +18,15 @@ bin/elasticsearch-create-enrollment-token
 [discrete]
 === Description
 
+NOTE: `elasticsearch-create-enrollment-token` can only be used with {es} clusters
+that have been <<configuring-stack-security,auto-configured for security>>.
+
 Use this command to create enrollment tokens, which you can use to enroll new
 {es} nodes to an existing cluster or configure {kib} instances to communicate
 with an existing {es} cluster that has security features enabled.
 The command generates (and subsequently removes) a temporary user in the
 <<file-realm,file realm>> to run the request that creates enrollment tokens.
+
 IMPORTANT: You cannot use this tool if the file realm is disabled in your
 `elasticsearch.yml` file.
 

+ 9 - 8
x-pack/docs/en/security/configuring-stack-security.asciidoc

@@ -11,9 +11,9 @@ generated for the transport and HTTP layers.
 * An enrollment token is generated for {kib}.
 
 You can then start {kib} and enter the enrollment token, which is valid for 30
-minutes. This token automatically applies the security settings from your {es} 
-cluster, authenticates to {es} with the built-in `kibana` service account, and writes the 
-security configuration to `kibana.yml`. 
+minutes. This token automatically applies the security settings from your {es}
+cluster, authenticates to {es} with the built-in `kibana` service account, and writes the
+security configuration to `kibana.yml`.
 
 [discrete]
 === Prerequisites
@@ -28,7 +28,7 @@ the `kibana 8.0.0-beta` package distribution for your environment.
 [[stack-start-with-security]]
 === Start {es} and enroll {kib} with security enabled
 
-. From the installation directory, start {es}. A password is generated for the 
+. From the installation directory, start {es}. A password is generated for the
 `elastic` user and output to the terminal, plus an enrollment token for
 enrolling {kib}.
 +
@@ -52,8 +52,8 @@ To generate new enrollment tokens for {kib} or {es} nodes, run the
 These tools are available in the {es} `bin` directory.
 ====
 
-. (Optional) Open a new terminal and verify that you can connect to your {es} 
-cluster by making an authenticated call. Enter the password for the `elastic` 
+. (Optional) Open a new terminal and verify that you can connect to your {es}
+cluster by making an authenticated call. Enter the password for the `elastic`
 user when prompted:
 +
 [source,shell]
@@ -108,7 +108,8 @@ to encrypt internode communication. The files are listed here for reference.
 
 `http_ca.crt`::
 The CA certificate that is used to sign the certificates for the HTTP layer of
-this {es} cluster.
+this {es} cluster. You can use this CA certificate to configure any client to
+trust the certificate that {es} uses for HTTPS.
 
 `http.p12`::
 Keystore that contains the key and certificate for the HTTP layer for this node.
@@ -117,6 +118,6 @@ Keystore that contains the key and certificate for the HTTP layer for this node.
 Keystore that contains the key and certificate for the transport layer for all
 the nodes in your cluster.
 
-Additionally, when you use the enrollment token to connect {kib} to a secured {es} cluster, a security certificate is retrieved from {es} and stored in the
+Additionally, when you use the enrollment token to connect {kib} to a secured {es} cluster, the HTTP layer CA certificate is retrieved from {es} and stored in the
 {kib} `/data` directory. This file establishes trust between {kib} and the {es}
 Certificate Authority (CA) for the HTTP layer.