enroll-kibana.asciidoc 1.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
  1. [[security-api-kibana-enrollment]]
  2. === Enroll {kib} API
  3. ++++
  4. <titleabbrev>Enroll {kib}</titleabbrev>
  5. ++++
  6. Enables a {kib} instance to configure itself for communication with a secured {es} cluster.
  7. NOTE: This API is currently intended for internal use only by {kib}.
  8. [[security-api-kibana-enrollment-request]]
  9. ==== {api-request-title}
  10. `GET /_security/enroll/kibana`
  11. [[security-api-kibana-enrollment-desc]]
  12. ==== {api-description-title}
  13. {kib} uses this API internally to configure itself for communications with an
  14. {es} cluster that already has security features enabled.
  15. [[security-api-client-enrollment-examples]]
  16. ==== {api-examples-title}
  17. The following example shows how to enroll a {kib} instance.
  18. [source,console]
  19. ----
  20. GET /_security/enroll/kibana
  21. ----
  22. // TEST[skip:we need to enable HTTP TLS for the docs cluster]
  23. The API returns the following response:
  24. [source,console_result]
  25. ----
  26. {
  27. "token" : {
  28. "name" : "enroll-process-token-1629123923000", <1>
  29. "value": "AAEAAWVsYXN0aWM...vZmxlZXQtc2VydmVyL3Rva2VuMTo3TFdaSDZ" <2>
  30. },
  31. "http_ca" : "MIIJlAIBAzVoGCSqGSIb3...vsDfsA3UZBAjEPfhubpQysAICAA=", <3>
  32. }
  33. ----
  34. <1> The name of the bearer token for the `elastic/kibana` service account.
  35. <2> The value of the bearer token for the `elastic/kibana` service account.
  36. Use this value to {ref}/service-accounts.html#authenticate-with-service-account-token[authenticate the service account] with {es}.
  37. <3> The CA certificate used to sign the node certificates that {es} uses for TLS
  38. on the HTTP layer. The certificate is returned as a Base64 encoded string of the
  39. ASN.1 DER encoding of the certificate.