123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285 |
- [role="xpack"]
- [[security-api-update-cross-cluster-api-key]]
- === Update Cross-Cluster API key API
- ++++
- <titleabbrev>Update Cross-Cluster API key</titleabbrev>
- ++++
- .New API reference
- [sidebar]
- --
- For the most up-to-date API details, refer to {api-es}/group/endpoint-security[Security APIs].
- --
- Update an existing cross-cluster API Key that is used for <<remote-clusters-api-key,API key based remote cluster>> access.
- [[security-api-update-cross-cluster-api-key-request]]
- ==== {api-request-title}
- `PUT /_security/cross_cluster/api_key/<id>`
- [[security-api-update-cross-cluster-api-key-prereqs]]
- ==== {api-prereq-title}
- * To use this API, you must have at least the `manage_security` cluster privilege.
- Users can only update API keys that they created.
- To update another user's API key, use the <<run-as-privilege,`run_as` feature>>
- to submit a request on behalf of another user.
- IMPORTANT: It's not possible to use an API key as the authentication credential for this API.
- To update an API key, the owner user's credentials are required.
- [[security-api-update-cross-cluster-api-key-desc]]
- ==== {api-description-title}
- Use this API to update cross-cluster API keys created by the <<security-api-create-cross-cluster-api-key,Create Cross-Cluster API key API>>.
- It's not possible to update expired API keys, or API keys that have been invalidated by
- <<security-api-invalidate-api-key,invalidate API Key>>.
- This API supports updates to an API key's access scope, metadata and expiration.
- The owner user's information, e.g. `username`, `realm`, is also updated automatically on every call.
- NOTE: This API cannot update <<security-api-create-api-key,REST API keys>>, which should be updated by
- either <<security-api-update-api-key>> or <<security-api-bulk-update-api-keys>> API.
- [[security-api-update-cross-cluster-api-key-path-params]]
- ==== {api-path-parms-title}
- `id`::
- (Required, string) The ID of the API key to update.
- [[security-api-update-cross-cluster-api-key-request-body]]
- ==== {api-request-body-title}
- You can specify the following parameters in the request body. The parameters are optional. But they cannot all be absent.
- [[security-api-update-cross-cluster-api-key-api-key-role-descriptors]]
- `access`::
- (Optional, object) The access to be granted to this API key. The access is
- composed of permissions for cross cluster search and cross cluster replication.
- At least one of them must be specified.
- When specified, the new access assignment fully replaces the previously assigned access.
- Refer to the <<cross-cluster-api-key-access,parameter of the same of the Create Cross-Cluster API key API>>
- for the field's structure.
- `metadata`::
- (Optional, object) Arbitrary metadata that you want to associate with the API key.
- It supports nested data structure.
- Within the `metadata` object, top-level keys beginning with `_` are reserved for system usage.
- When specified, this fully replaces metadata previously associated with the API key.
- `expiration`::
- (Optional, string) Expiration time for the API key. By default, API keys never expire. Can be omitted to leave unchanged.
- [[security-api-update-cross-cluster-api-key-response-body]]
- ==== {api-response-body-title}
- `updated`::
- (boolean) If `true`, the API key was updated.
- If `false`, the API key didn't change because no change was detected.
- [[security-api-update-cross-cluster-api-key-example]]
- ==== {api-examples-title}
- If you create a cross-cluster API key as follows:
- [source,console]
- ------------------------------------------------------------
- POST /_security/cross_cluster/api_key
- {
- "name": "my-cross-cluster-api-key",
- "access": {
- "search": [
- {
- "names": ["logs*"]
- }
- ]
- },
- "metadata": {
- "application": "search"
- }
- }
- ------------------------------------------------------------
- A successful call returns a JSON structure that provides API key information.
- For example:
- [source,console-result]
- --------------------------------------------------
- {
- "id": "VuaCfGcBCdbkQm-e5aOx",
- "name": "my-cross-cluster-api-key",
- "api_key": "ui2lp2axTNmsyakw9tvNnw",
- "encoded": "VnVhQ2ZHY0JDZGJrUW0tZTVhT3g6dWkybHAyYXhUTm1zeWFrdzl0dk5udw=="
- }
- --------------------------------------------------
- // TESTRESPONSE[s/VuaCfGcBCdbkQm-e5aOx/$body.id/]
- // TESTRESPONSE[s/ui2lp2axTNmsyakw9tvNnw/$body.api_key/]
- // TESTRESPONSE[s/VnVhQ2ZHY0JDZGJrUW0tZTVhT3g6dWkybHAyYXhUTm1zeWFrdzl0dk5udw==/$body.encoded/]
- Information of the API key, including its exact role descriptor can be inspected with
- the <<security-api-get-api-key,Get API key API>>
- [source,console]
- --------------------------------------------------
- GET /_security/api_key?id=VuaCfGcBCdbkQm-e5aOx
- --------------------------------------------------
- // TEST[s/VuaCfGcBCdbkQm-e5aOx/$body.id/]
- // TEST[continued]
- A successful call returns a JSON structure that contains the information of the API key:
- [source,js]
- --------------------------------------------------
- {
- "api_keys": [
- {
- "id": "VuaCfGcBCdbkQm-e5aOx",
- "name": "my-cross-cluster-api-key",
- "type": "cross_cluster",
- "creation": 1548550550158,
- "expiration": null,
- "invalidated": false,
- "username": "myuser",
- "realm": "native1",
- "metadata": {
- "application": "search"
- },
- "role_descriptors": {
- "cross_cluster": { <1>
- "cluster": [
- "cross_cluster_search"
- ],
- "indices": [
- {
- "names": [
- "logs*"
- ],
- "privileges": [
- "read", "read_cross_cluster", "view_index_metadata"
- ],
- "allow_restricted_indices": false
- }
- ],
- "applications": [ ],
- "run_as": [ ],
- "metadata": { },
- "transient_metadata": {
- "enabled": true
- }
- }
- },
- "access": { <2>
- "search": [
- {
- "names": [
- "logs*"
- ],
- "allow_restricted_indices": false
- }
- ]
- }
- }
- ]
- }
- --------------------------------------------------
- // NOTCONSOLE
- <1> Role descriptor corresponding to the specified `access` scope at creation time.
- In this example, it grants cross cluster search permission for the `logs*` index pattern.
- <2> The `access` corresponds to the value specified at API key creation time.
- The following example updates the API key created above, assigning it new access scope and metadata:
- [source,console]
- ----
- PUT /_security/cross_cluster/api_key/VuaCfGcBCdbkQm-e5aOx
- {
- "access": {
- "replication": [
- {
- "names": ["archive"]
- }
- ]
- },
- "metadata": {
- "application": "replication"
- }
- }
- ----
- // TEST[s/VuaCfGcBCdbkQm-e5aOx/\${body.api_keys.0.id}/]
- // TEST[continued]
- A successful call returns a JSON structure indicating that the API key was updated:
- [source,console-result]
- ----
- {
- "updated": true
- }
- ----
- The API key's permissions after the update can be inspected again with the <<security-api-get-api-key,Get API key API>>
- and it will be:
- [source,js]
- --------------------------------------------------
- {
- "api_keys": [
- {
- "id": "VuaCfGcBCdbkQm-e5aOx",
- "name": "my-cross-cluster-api-key",
- "type": "cross_cluster",
- "creation": 1548550550158,
- "expiration": null,
- "invalidated": false,
- "username": "myuser",
- "realm": "native1",
- "metadata": {
- "application": "replication"
- },
- "role_descriptors": {
- "cross_cluster": { <1>
- "cluster": [
- "cross_cluster_replication"
- ],
- "indices": [
- {
- "names": [
- "archive*"
- ],
- "privileges": [
- "cross_cluster_replication", "cross_cluster_replication_internal"
- ],
- "allow_restricted_indices": false
- }
- ],
- "applications": [ ],
- "run_as": [ ],
- "metadata": { },
- "transient_metadata": {
- "enabled": true
- }
- }
- },
- "access": { <2>
- "replication": [
- {
- "names": [
- "archive*"
- ],
- "allow_restricted_indices": false
- }
- ]
- }
- }
- ]
- }
- --------------------------------------------------
- // NOTCONSOLE
- <1> Role descriptor is updated to be the `access` scope specified at update time.
- In this example, it is updated to grant the cross cluster replication permission
- for the `archive*` index pattern.
- <2> The `access` corresponds to the value specified at API key update time.
|