security.asciidoc 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113
  1. [float]
  2. [[breaking_80_security_changes]]
  3. === Security changes
  4. //NOTE: The notable-breaking-changes tagged regions are re-used in the
  5. //Installation and Upgrade Guide
  6. //tag::notable-breaking-changes[]
  7. // end::notable-breaking-changes[]
  8. [float]
  9. [[accept-default-password-removed]]
  10. ==== The `accept_default_password` setting has been removed
  11. The `xpack.security.authc.accept_default_password` setting has not had any affect
  12. since the 6.0 release of {es}. It has been removed and cannot be used.
  13. [float]
  14. [[roles-index-cache-removed]]
  15. ==== The `roles.index.cache.*` settings have been removed
  16. The `xpack.security.authz.store.roles.index.cache.max_size` and
  17. `xpack.security.authz.store.roles.index.cache.ttl` settings have
  18. been removed. These settings have been redundant and deprecated
  19. since the 5.2 release of {es}.
  20. [float]
  21. [[migrate-tool-removed]]
  22. ==== The `elasticsearch-migrate` tool has been removed
  23. The `elasticsearch-migrate` tool provided a way to convert file
  24. realm users and roles into the native realm. It has been deprecated
  25. since 7.2.0. Users and roles should now be created in the native
  26. realm directly.
  27. [float]
  28. [[separating-node-and-client-traffic]]
  29. ==== The `transport.profiles.*.xpack.security.type` setting has been removed
  30. The `transport.profiles.*.xpack.security.type` setting has been removed since
  31. the Transport Client has been removed and therefore all client traffic now uses
  32. the HTTP transport. Transport profiles using this setting should be removed.
  33. [float]
  34. [[ssl-validation-changes]]
  35. ==== SSL/TLS configuration validation
  36. [float]
  37. ===== The `xpack.security.transport.ssl.enabled` setting may be required
  38. It is now an error to configure any SSL settings for
  39. `xpack.security.transport.ssl` without also configuring
  40. `xpack.security.transport.ssl.enabled`.
  41. For example, the following configuration is invalid:
  42. [source,yaml]
  43. --------------------------------------------------
  44. xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
  45. xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
  46. --------------------------------------------------
  47. And must be configured as:
  48. [source,yaml]
  49. --------------------------------------------------
  50. xpack.security.transport.ssl.enabled: true <1>
  51. xpack.security.transport.ssl.keystore.path: elastic-certificates.p12
  52. xpack.security.transport.ssl.truststore.path: elastic-certificates.p12
  53. --------------------------------------------------
  54. <1> or `false`.
  55. [float]
  56. ===== The `xpack.security.http.ssl.enabled` setting may be required
  57. It is now an error to configure any SSL settings for
  58. `xpack.security.http.ssl` without also configuring
  59. `xpack.security.http.ssl.enabled`.
  60. For example, the following configuration is invalid:
  61. [source,yaml]
  62. --------------------------------------------------
  63. xpack.security.http.ssl.certificate: elasticsearch.crt
  64. xpack.security.http.ssl.key: elasticsearch.key
  65. xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
  66. --------------------------------------------------
  67. And must be configured as either:
  68. [source,yaml]
  69. --------------------------------------------------
  70. xpack.security.http.ssl.enabled: true <1>
  71. xpack.security.http.ssl.certificate: elasticsearch.crt
  72. xpack.security.http.ssl.key: elasticsearch.key
  73. xpack.security.http.ssl.certificate_authorities: [ "corporate-ca.crt" ]
  74. --------------------------------------------------
  75. <1> or `false`.
  76. [float]
  77. ===== The `xpack.security.transport.ssl` Certificate and Key may be required
  78. It is now an error to enable SSL for the transport interface without also configuring
  79. a certificate and key through use of the `xpack.security.transport.ssl.keystore.path`
  80. setting or the `xpack.security.transport.ssl.certificate` and
  81. `xpack.security.transport.ssl.key` settings.
  82. [float]
  83. ===== The `xpack.security.http.ssl` Certificate and Key may be required
  84. It is now an error to enable SSL for the HTTP (Rest) server without also configuring
  85. a certificate and key through use of the `xpack.security.http.ssl.keystore.path`
  86. setting or the `xpack.security.http.ssl.certificate` and
  87. `xpack.security.http.ssl.key` settings.