files.asciidoc 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839
  1. [role="xpack"]
  2. [testenv="gold"]
  3. [[security-files]]
  4. === Security files
  5. The {es} {security-features} use the following files:
  6. * `ES_PATH_CONF/roles.yml` defines the roles in use on the cluster. See
  7. {stack-ov}/defining-roles.html[Defining roles].
  8. * `ES_PATH_CONF/elasticsearch-users` defines the users and their hashed passwords for
  9. the `file` realm. See <<configuring-file-realm>>.
  10. * `ES_PATH_CONF/elasticsearch-users_roles` defines the user roles assignment for the
  11. the `file` realm. See <<configuring-file-realm>>.
  12. * `ES_PATH_CONF/role_mapping.yml` defines the role assignments for a
  13. Distinguished Name (DN) to a role. This allows for LDAP and Active Directory
  14. groups and users and PKI users to be mapped to roles. See
  15. {stack-ov}/mapping-roles.html[Mapping users and groups to roles].
  16. * `ES_PATH_CONF/log4j2.properties` contains audit information. See
  17. {stack-ov}/audit-log-output.html[Logfile audit output].
  18. [[security-files-location]]
  19. IMPORTANT: Any files that the {security-features} use must be stored in the {es}
  20. configuration directory. {es} runs with restricted permissions
  21. and is only permitted to read from the locations configured in the
  22. directory layout for enhanced security.
  23. Several of these files are in the YAML format. When you edit these files, be
  24. aware that YAML is indentation-level sensitive and indentation errors can lead
  25. to configuration errors. Avoid the tab character to set indentation levels, or
  26. use an editor that automatically expands tabs to spaces.
  27. Be careful to properly escape YAML constructs such as `:` or leading exclamation
  28. points within quoted strings. Using the `|` or `>` characters to define block
  29. literals instead of escaping the problematic characters can help avoid problems.