| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176 | tag::ssl-certificate[]Specifies the path for the PEM encoded certificate (or certificate chain) that isassociated with the key.+This setting can be used only if `ssl.key` is set.end::ssl-certificate[]tag::ssl-certificate-authorities[]List of paths to PEM encoded certificate files that should be trusted.+This setting and `ssl.truststore.path` cannot be used at the same time.end::ssl-certificate-authorities[]tag::ssl-cipher-suites-values[]Supported cipher suites vary depending on which version of Java you use. Forexample, for version 12 the default value is `TLS_AES_256_GCM_SHA384`,`TLS_AES_128_GCM_SHA256`, `TLS_CHACHA20_POLY1305_SHA256`,`TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384`, `TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256`,`TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384`, `TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256`,`TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256`, `TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256`,`TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384`, `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256`,`TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384`, `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`,`TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA`, `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA`,`TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA`, `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`,`TLS_RSA_WITH_AES_256_GCM_SHA384`, `TLS_RSA_WITH_AES_128_GCM_SHA256`,`TLS_RSA_WITH_AES_256_CBC_SHA256`, `TLS_RSA_WITH_AES_128_CBC_SHA256`,`TLS_RSA_WITH_AES_256_CBC_SHA`, `TLS_RSA_WITH_AES_128_CBC_SHA`.+For more information, see Oracle'shttps://docs.oracle.com/en/java/javase/11/security/oracle-providers.html#GUID-7093246A-31A3-4304-AC5F-5FB6400405E2[Java Cryptography Architecture documentation].end::ssl-cipher-suites-values[]tag::ssl-cipher-suites-values-java11[]Supported cipher suites vary depending on which version of Java you use. Forexample, for version 11 the default value is `TLS_AES_256_GCM_SHA384`,`TLS_AES_128_GCM_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384`,`TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256`, `TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384`,`TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384`,`TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256`, `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384`,`TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA`,`TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA`, `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA`,`TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`, `TLS_RSA_WITH_AES_256_GCM_SHA384`,`TLS_RSA_WITH_AES_128_GCM_SHA256`, `TLS_RSA_WITH_AES_256_CBC_SHA256`,`TLS_RSA_WITH_AES_128_CBC_SHA256`, `TLS_RSA_WITH_AES_256_CBC_SHA`,`TLS_RSA_WITH_AES_128_CBC_SHA`.+For more information, see Oracle'shttps://docs.oracle.com/en/java/javase/11/security/oracle-providers.html#GUID-7093246A-31A3-4304-AC5F-5FB6400405E2[Java Cryptography Architecture documentation].end::ssl-cipher-suites-values-java11[]tag::ssl-key-pem[]Path to a PEM encoded file containing the private key.+If HTTP client authentication is required, it uses this file. You cannot usethis setting and `ssl.keystore.path` at the same time.end::ssl-key-pem[]tag::ssl-key-passphrase[]The passphrase that is used to decrypt the private key. Since the key might notbe encrypted, this value is optional.+You cannot use this setting and `ssl.secure_key_passphrase` at the same time.end::ssl-key-passphrase[]tag::ssl-keystore-key-password[]The password for the key in the keystore. The default is the keystore password.+You cannot use this setting and `ssl.keystore.secure_password` at the same time.//TBD: You cannot use this setting and `ssl.keystore.secure_key_password` at the same time.end::ssl-keystore-key-password[]tag::ssl-keystore-password[]The password for the keystore.//TBD: You cannot use this setting and `ssl.keystore.secure_password` at the same time.end::ssl-keystore-password[]tag::ssl-keystore-path[]The path for the keystore file that contains a private key and certificate.+It must be either a Java keystore (jks) or a PKCS#12 file. You cannot use thissetting and `ssl.key` at the same time.//TBD: It must be either a Java keystore (jks) or a PKCS#12 file.//TBD: You cannot use this setting and `ssl.key` at the same time.end::ssl-keystore-path[]tag::ssl-keystore-secure-key-password[]The password for the key in the keystore. The default is the keystore password.//TBD: You cannot use this setting and `ssl.keystore.key_password` at the same time.end::ssl-keystore-secure-key-password[]tag::ssl-keystore-secure-password[]The password for the keystore.//TBD: You cannot use this setting and `ssl.keystore.password` at the same time.end::ssl-keystore-secure-password[]tag::ssl-keystore-type-pkcs12[]The format of the keystore file. It must be either `jks` or `PKCS12`. If thekeystore path ends in ".p12", ".pfx", or ".pkcs12", this setting defaultsto `PKCS12`. Otherwise, it defaults to `jks`.end::ssl-keystore-type-pkcs12[]tag::ssl-secure-key-passphrase[]The passphrase that is used to decrypt the private key. Since the key might notbe encrypted, this value is optional.//TBD: You cannot use this setting and `ssl.key_passphrase` at the same time.end::ssl-secure-key-passphrase[]tag::ssl-supported-protocols[]Supported protocols with versions. Valid protocols: `SSLv2Hello`,`SSLv3`, `TLSv1`, `TLSv1.1`, `TLSv1.2`, `TLSv1.3`. If the JVM's SSL provider supports TLSv1.3,the default is `TLSv1.3,TLSv1.2,TLSv1.1`. Otherwise, the default is`TLSv1.2,TLSv1.1`.+{es} relies on your JDK’s implementation of SSL and TLS.View <<jdk-tls-versions>> for more information.+--NOTE: If `xpack.security.fips_mode.enabled` is `true`, you cannot use `SSLv2Hello`or `SSLv3`. See <<fips-140-compliance>>.--end::ssl-supported-protocols[]tag::ssl-truststore-password[]The password for the truststore.+You cannot use this setting and `ssl.truststore.secure_password` at the sametime.//TBD: You cannot use this setting and `ssl.truststore.secure_password` at the same time.end::ssl-truststore-password[]tag::ssl-truststore-path[]The path for the keystore that contains the certificates to trust. It must beeither a Java keystore (jks) or a PKCS#12 file.+You cannot use this setting and `ssl.certificate_authorities` at the same time.//TBD: You cannot use this setting and `ssl.certificate_authorities` at the same time.end::ssl-truststore-path[]tag::ssl-truststore-secure-password[]Password for the truststore.//TBD: You cannot use this setting and `ssl.truststore.password` at the same time.end::ssl-truststore-secure-password[]tag::ssl-truststore-type[]The format of the truststore file. It must be either `jks` or `PKCS12`. If thefile name ends in ".p12", ".pfx" or "pkcs12", the default is `PKCS12`.Otherwise, it defaults to `jks`.end::ssl-truststore-type[]tag::ssl-verification-mode-values[]+.Valid values[%collapsible%open]=====`full`::Validates that the provided certificate: has an issue date that'swithin the `not_before` and `not_after` dates; chains to a trusted CertificateAuthority (CA); has a `hostname` or IP address that matches the names withinthe certificate.`certificate`::Validates the provided certificate and verifies that it's signed by a trusted authority (CA), but doesn't check the certificate `hostname`.`none`::Performs no certificate validation.+IMPORTANT: Setting certificate validation to `none` disables many securitybenefits of SSL/TLS, which is very dangerous. Only set this value if instructedby Elastic Support as a temporary diagnostic mechanism when attempting toresolve TLS errors.=====+Defaults to `full`.end::ssl-verification-mode-values[]
 |