overview.asciidoc 1.6 KB

12345678910111213141516171819202122232425262728293031
  1. [role="xpack"]
  2. [[setting-up-authentication]]
  3. == User authentication
  4. Authentication identifies an individual. To gain access to restricted resources,
  5. a user must prove their identity, via passwords, credentials, or some other
  6. means (typically referred to as authentication tokens).
  7. The {stack} authenticates users by identifying the users behind the requests
  8. that hit the cluster and verifying that they are who they claim to be. The
  9. authentication process is handled by one or more authentication services called
  10. <<realms,_realms_>>.
  11. You can use the native support for managing and authenticating users, or
  12. integrate with external user management systems such as LDAP and Active
  13. Directory.
  14. The {stack-security-features} provide built-in realms such as `native`,`ldap`,
  15. `active_directory`, `pki`, `file`, `saml`, and `oidc`. If none of the built-in
  16. realms meet your needs, you can also build your own custom realm and plug it
  17. into the {stack}.
  18. When {security-features} are enabled, depending on the realms you've configured,
  19. you must attach your user credentials to the requests sent to {es}. For example,
  20. when using realms that support usernames and passwords you can simply attach
  21. {wikipedia}/Basic_access_authentication[basic auth] header to the requests.
  22. The {security-features} provide two services: the token service and the api key
  23. service. You can use these services to exchange the current authentication for
  24. a token or key. This token or key can then be used as credentials for authenticating
  25. new requests. These services are enabled by default when TLS/SSL is enabled for HTTP.