security.asciidoc 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. [float]
  2. [[breaking_80_security_changes]]
  3. === Security changes
  4. //NOTE: The notable-breaking-changes tagged regions are re-used in the
  5. //Installation and Upgrade Guide
  6. //tag::notable-breaking-changes[]
  7. [float]
  8. ==== The realm `order` setting is required
  9. The `xpack.security.authc.realms.{type}.{name}.order` setting is now required and must be
  10. specified for each explicitly configured realm. Each value must be unique.
  11. The cluster will fail to start if the requirements are not met.
  12. For example, the following configuration is invalid:
  13. [source,yaml]
  14. --------------------------------------------------
  15. xpack.security.authc.realms.kerberos.kerb1:
  16. keytab.path: es.keytab
  17. remove_realm_name: false
  18. --------------------------------------------------
  19. And must be configured as:
  20. [source,yaml]
  21. --------------------------------------------------
  22. xpack.security.authc.realms.kerberos.kerb1:
  23. order: 0
  24. keytab.path: es.keytab
  25. remove_realm_name: false
  26. --------------------------------------------------
  27. // end::notable-breaking-changes[]
  28. [float]
  29. [[accept-default-password-removed]]
  30. ==== The `accept_default_password` setting has been removed
  31. The `xpack.security.authc.accept_default_password` setting has not had any affect
  32. since the 6.0 release of {es}. It has been removed and cannot be used.
  33. [float]
  34. [[roles-index-cache-removed]]
  35. ==== The `roles.index.cache.*` settings have been removed
  36. The `xpack.security.authz.store.roles.index.cache.max_size` and
  37. `xpack.security.authz.store.roles.index.cache.ttl` settings have
  38. been removed. These settings have been redundant and deprecated
  39. since the 5.2 release of {es}.
  40. [float]
  41. [[migrate-tool-removed]]
  42. ==== The `elasticsearch-migrate` tool has been removed
  43. The `elasticsearch-migrate` tool provided a way to convert file
  44. realm users and roles into the native realm. It has been deprecated
  45. since 7.2.0. Users and roles should now be created in the native
  46. realm directly.
  47. [float]
  48. [[separating-node-and-client-traffic]]
  49. ==== The `transport.profiles.*.xpack.security.type` setting has been removed
  50. The `transport.profiles.*.xpack.security.type` setting has been removed since
  51. the Transport Client has been removed and therefore all client traffic now uses
  52. the HTTP transport. Transport profiles using this setting should be removed.
  53. [float]
  54. [[ssl-validation-changes]]
  55. ==== SSL/TLS configuration validation
  56. [float]
  57. ===== The `xpack.security.transport.ssl.enabled` setting may be required
  58. It is now an error to configure any SSL settings for
  59. `xpack.security.transport.ssl` without also configuring
  60. `xpack.security.transport.ssl.enabled`.
  61. For example, the following configuration is invalid:
  62. [source,yaml]
  63. --------------------------------------------------
  64. xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
  65. xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
  66. --------------------------------------------------
  67. And must be configured as:
  68. [source,yaml]
  69. --------------------------------------------------
  70. xpack.security.transport.ssl.enabled: true <1>
  71. xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
  72. xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
  73. --------------------------------------------------
  74. <1> or `false`.
  75. [float]
  76. ===== The `xpack.security.http.ssl.enabled` setting may be required
  77. It is now an error to configure any SSL settings for
  78. `xpack.security.http.ssl` without also configuring
  79. `xpack.security.http.ssl.enabled`.
  80. For example, the following configuration is invalid:
  81. [source,yaml]
  82. --------------------------------------------------
  83. xpack.security.http.ssl.certificate: elasticsearch.crt
  84. xpack.security.http.ssl.key: elasticsearch.key
  85. xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
  86. --------------------------------------------------
  87. And must be configured as either:
  88. [source,yaml]
  89. --------------------------------------------------
  90. xpack.security.http.ssl.enabled: true <1>
  91. xpack.security.http.ssl.certificate: elasticsearch.crt
  92. xpack.security.http.ssl.key: elasticsearch.key
  93. xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
  94. --------------------------------------------------
  95. <1> or `false`.
  96. [float]
  97. ===== The `xpack.security.transport.ssl` Certificate and Key may be required
  98. It is now an error to enable SSL for the transport interface without also configuring
  99. a certificate and key through use of the `xpack.security.transport.ssl.keystore.path`
  100. setting or the `xpack.security.transport.ssl.certificate` and
  101. `xpack.security.transport.ssl.key` settings.
  102. [float]
  103. ===== The `xpack.security.http.ssl` Certificate and Key may be required
  104. It is now an error to enable SSL for the HTTP (Rest) server without also configuring
  105. a certificate and key through use of the `xpack.security.http.ssl.keystore.path`
  106. setting or the `xpack.security.http.ssl.certificate` and
  107. `xpack.security.http.ssl.key` settings.