123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190 |
- [float]
- [[breaking_80_security_changes]]
- === Security changes
- //NOTE: The notable-breaking-changes tagged regions are re-used in the
- //Installation and Upgrade Guide
- //tag::notable-breaking-changes[]
- .The realm `order` setting is now required.
- [%collapsible]
- ====
- *Details* +
- The `xpack.security.authc.realms.{type}.{name}.order` setting is now required and must be
- specified for each explicitly configured realm. Each value must be unique.
- The cluster will fail to start if the requirements are not met.
- For example, the following configuration is invalid:
- [source,yaml]
- --------------------------------------------------
- xpack.security.authc.realms.kerberos.kerb1:
- keytab.path: es.keytab
- remove_realm_name: false
- --------------------------------------------------
- And must be configured as:
- [source,yaml]
- --------------------------------------------------
- xpack.security.authc.realms.kerberos.kerb1:
- order: 0
- keytab.path: es.keytab
- remove_realm_name: false
- --------------------------------------------------
- ====
- // end::notable-breaking-changes[]
- [[accept-default-password-removed]]
- .The `accept_default_password` setting has been removed.
- [%collapsible]
- ====
- *Details* +
- The `xpack.security.authc.accept_default_password` setting has not had any affect
- since the 6.0 release of {es}. It has been removed and cannot be used.
- ====
- [[roles-index-cache-removed]]
- .The `roles.index.cache.*` settings have been removed.
- [%collapsible]
- ====
- *Details* +
- The `xpack.security.authz.store.roles.index.cache.max_size` and
- `xpack.security.authz.store.roles.index.cache.ttl` settings have
- been removed. These settings have been redundant and deprecated
- since the 5.2 release of {es}.
- ====
- [[migrate-tool-removed]]
- .The `elasticsearch-migrate` tool has been removed.
- [%collapsible]
- ====
- *Details* +
- The `elasticsearch-migrate` tool provided a way to convert file
- realm users and roles into the native realm. It has been deprecated
- since 7.2.0. Users and roles should now be created in the native
- realm directly.
- ====
- [[separating-node-and-client-traffic]]
- .The `transport.profiles.*.xpack.security.type` setting has been removed.
- [%collapsible]
- ====
- *Details* +
- The `transport.profiles.*.xpack.security.type` setting has been removed since
- the Transport Client has been removed and therefore all client traffic now uses
- the HTTP transport. Transport profiles using this setting should be removed.
- ====
- [discrete]
- [[ssl-validation-changes]]
- ==== SSL/TLS configuration validation
- .The `xpack.security.transport.ssl.enabled` setting is now required to configure `xpack.security.transport.ssl` settings.
- [%collapsible]
- ====
- *Details* +
- It is now an error to configure any SSL settings for
- `xpack.security.transport.ssl` without also configuring
- `xpack.security.transport.ssl.enabled`.
- For example, the following configuration is invalid:
- [source,yaml]
- --------------------------------------------------
- xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
- xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
- --------------------------------------------------
- And must be configured as:
- [source,yaml]
- --------------------------------------------------
- xpack.security.transport.ssl.enabled: true <1>
- xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
- xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
- --------------------------------------------------
- <1> or `false`.
- ====
- .The `xpack.security.http.ssl.enabled` setting is now required to configure `xpack.security.http.ssl` settings.
- [%collapsible]
- ====
- *Details* +
- It is now an error to configure any SSL settings for
- `xpack.security.http.ssl` without also configuring
- `xpack.security.http.ssl.enabled`.
- For example, the following configuration is invalid:
- [source,yaml]
- --------------------------------------------------
- xpack.security.http.ssl.certificate: elasticsearch.crt
- xpack.security.http.ssl.key: elasticsearch.key
- xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
- --------------------------------------------------
- And must be configured as either:
- [source,yaml]
- --------------------------------------------------
- xpack.security.http.ssl.enabled: true <1>
- xpack.security.http.ssl.certificate: elasticsearch.crt
- xpack.security.http.ssl.key: elasticsearch.key
- xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
- --------------------------------------------------
- <1> or `false`.
- ====
- .A `xpack.security.transport.ssl` certificate and key are now required to enable SSL for the transport interface.
- [%collapsible]
- ====
- *Details* +
- It is now an error to enable SSL for the transport interface without also configuring
- a certificate and key through use of the `xpack.security.transport.ssl.keystore.path`
- setting or the `xpack.security.transport.ssl.certificate` and
- `xpack.security.transport.ssl.key` settings.
- ====
- .A `xpack.security.http.ssl` certificate and key are now required to enable SSL for the HTTP server.
- [%collapsible]
- ====
- *Details* +
- It is now an error to enable SSL for the HTTP (Rest) server without also configuring
- a certificate and key through use of the `xpack.security.http.ssl.keystore.path`
- setting or the `xpack.security.http.ssl.certificate` and
- `xpack.security.http.ssl.key` settings.
- ====
- [discrete]
- [[builtin-users-changes]]
- ==== Changes to built-in users
- .The `kibana` user has been renamed `kibana_system`.
- [%collapsible]
- ====
- *Details* +
- The `kibana` user was historically used to authenticate {kib} to {es}.
- The name of this user was confusing, and was often mistakenly used to login to {kib}.
- This has been renamed to `kibana_system` in order to reduce confusion, and to better
- align with other built-in system accounts.
- If your `kibana.yml` used to contain:
- [source,yaml]
- --------------------------------------------------
- elasticsearch.username: kibana
- --------------------------------------------------
- then you should update to use the new `kibana_system` user instead:
- [source,yaml]
- --------------------------------------------------
- elasticsearch.username: kibana_system
- --------------------------------------------------
- ====
- [discrete]
- [[builtin-roles-changes]]
- ==== Changes to built-in roles
- .The `kibana_user` role has been renamed to `kibana_admin`.
- [%collapsible]
- ====
- *Details* +
- Users who were previously assigned the `kibana_user` role should instead be assigned
- the `kibana_admin` role. This role grants the same set of privileges as `kibana_user`, but has been
- renamed to better reflect its intended use.
- ====
|