Skip to content

Commit ede3a82

Browse files
authored
clean up security-related raw files (#889)
1 parent 7136c1b commit ede3a82

File tree

15 files changed

+9
-411
lines changed

15 files changed

+9
-411
lines changed

deploy-manage/security.md

Lines changed: 2 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ mapped_urls:
1010
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece-securing-ece.html
1111
- https://www.elastic.co/guide/en/cloud-heroku/current/ech-security.html
1212
- https://www.elastic.co/guide/en/kibana/current/using-kibana-with-security.html
13-
- https://www.elastic.co/guide/en/elasticsearch/reference/current/security-limitations.html
1413
- https://www.elastic.co/guide/en/elasticsearch/reference/current/es-security-principles.html
1514
- https://www.elastic.co/guide/en/cloud/current/ec-faq-technical.html
1615
---
@@ -25,26 +24,14 @@ mapped_urls:
2524

2625
% Note that the encryption happens at the file system level.
2726

27+
% We do provide [static IP ranges](../../../deploy-manage/security/elastic-cloud-static-ips.md), but they should be used with caution as noted in the documentation. IP addresses assigned to cloud resources can change without notice. This could be initiated by cloud providers with no knowledge to us. For this reason, we generally do not recommend that you use firewall rules to allow or restrict certain IP ranges. If you do wish to secure communication for deployment endpoints on {{ech}}, please use [Private Link](../../../deploy-manage/security/traffic-filtering.md). However, in situations where using Private Link services do not meet requirements (for example, secure traffic **from** Elastic Cloud), static IP ranges can be used.
28+
2829
% What needs to be done: Refine
2930

3031
% GitHub issue: https://github.com/elastic/docs-projects/issues/346
3132

3233
% Scope notes: this is just communication security - link to users + roles, spaces, monitoring, ++
3334

34-
% Use migrated content from existing pages that map to this page:
35-
36-
% - [ ] ./raw-migrated-files/elasticsearch/elasticsearch-reference/security-files.md
37-
% Notes: redirect only
38-
% - [ ] ./raw-migrated-files/elasticsearch/elasticsearch-reference/secure-cluster.md
39-
% - [ ] ./raw-migrated-files/kibana/kibana/xpack-security.md
40-
% - [ ] ./raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-securing-stack.md
41-
% - [ ] ./raw-migrated-files/cloud/cloud-enterprise/ece-securing-ece.md
42-
% - [ ] ./raw-migrated-files/cloud/cloud-heroku/ech-security.md
43-
% - [ ] ./raw-migrated-files/kibana/kibana/using-kibana-with-security.md
44-
% - [ ] ./raw-migrated-files/elasticsearch/elasticsearch-reference/security-limitations.md
45-
% - [ ] ./raw-migrated-files/elasticsearch/elasticsearch-reference/es-security-principles.md
46-
% - [ ] ./raw-migrated-files/cloud/cloud/ec-faq-technical.md
47-
4835
$$$field-document-limitations$$$
4936

5037
$$$alias-limitations$$$
@@ -59,18 +46,6 @@ $$$maintaining-audit-trail$$$
5946
**This page is a work in progress.**
6047
:::
6148

62-
% The documentation team is working to combine content pulled from the following pages:
63-
64-
% * [/raw-migrated-files/elasticsearch/elasticsearch-reference/security-files.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/security-files.md)
65-
% * [/raw-migrated-files/elasticsearch/elasticsearch-reference/secure-cluster.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/secure-cluster.md)
66-
% * [/raw-migrated-files/kibana/kibana/xpack-security.md](/raw-migrated-files/kibana/kibana/xpack-security.md)
67-
% * [/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-securing-stack.md](/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-securing-stack.md)
68-
% * [/raw-migrated-files/cloud/cloud-enterprise/ece-securing-ece.md](/raw-migrated-files/cloud/cloud-enterprise/ece-securing-ece.md)
69-
% * [/raw-migrated-files/cloud/cloud-heroku/ech-security.md](/raw-migrated-files/cloud/cloud-heroku/ech-security.md)
70-
% * [/raw-migrated-files/kibana/kibana/using-kibana-with-security.md](/raw-migrated-files/kibana/kibana/using-kibana-with-security.md)
71-
% * [/raw-migrated-files/elasticsearch/elasticsearch-reference/security-limitations.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/security-limitations.md)
72-
% * [/raw-migrated-files/elasticsearch/elasticsearch-reference/es-security-principles.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/es-security-principles.md)
73-
% * [/raw-migrated-files/cloud/cloud/ec-faq-technical.md](/raw-migrated-files/cloud/cloud/ec-faq-technical.md)
7449

7550
# Security
7651

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
---
2-
navigation_title: "Limitations"
2+
mapped_pages:
3+
- https://www.elastic.co/guide/en/elasticsearch/reference/current/security-limitations.html
4+
navigation_title: Limitations
35
---
46

57
# Security limitations [security-limitations]
@@ -23,7 +25,7 @@ Multi get and multi term vectors API throw IndexNotFoundException when trying to
2325

2426
## Filtered index aliases [_filtered_index_aliases]
2527

26-
Aliases containing filters are not a secure way to restrict access to individual documents, due to the limitations described in [Index and field names can be leaked when using aliases](../../../deploy-manage/security.md#alias-limitations). The {{stack-security-features}} provide a secure way to restrict access to documents through the [document-level security](../../../deploy-manage/users-roles/cluster-or-deployment-auth/controlling-access-at-document-field-level.md) feature.
28+
Aliases containing filters are not a secure way to restrict access to individual documents, due to the limitations described in [Index and field names can be leaked when using aliases](/deploy-manage/security.md#alias-limitations). The {{stack-security-features}} provide a secure way to restrict access to documents through the [document-level security](/deploy-manage/users-roles/cluster-or-deployment-auth/controlling-access-at-document-field-level.md) feature.
2729

2830

2931
## Field and document level security limitations [field-document-limitations]
@@ -40,7 +42,7 @@ Until this limitation is addressed, avoid index and field names that contain con
4042

4143
## LDAP realm [_ldap_realm]
4244

43-
The [LDAP Realm](../../../deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md) does not currently support the discovery of nested LDAP Groups. For example, if a user is a member of `group_1` and `group_1` is a member of `group_2`, only `group_1` will be discovered. However, the [Active Directory Realm](../../../deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md) **does** support transitive group membership.
45+
The [LDAP Realm](/deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md) does not currently support the discovery of nested LDAP Groups. For example, if a user is a member of `group_1` and `group_1` is a member of `group_2`, only `group_1` will be discovered. However, the [Active Directory Realm](/deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md) **does** support transitive group membership.
4446

4547

4648
## Resource sharing check for users and API keys [can-access-resources-check]
@@ -49,5 +51,4 @@ The result of [async search](https://www.elastic.co/docs/api/doc/elasticsearch/o
4951

5052
* Two different realms can have the same name on different nodes. This is not a recommended way to configure realms, therefore the resource sharing check does not attempt to detect this inconsistency.
5153
* Realms can be renamed. This can cause inconsistency for the resource sharing check when you submit an async search or scroll then rename the realm and try to retrieve the results. Hence, changing realm names should be handled with care since it can cause complications for more than just the resource sharing check.
52-
* The username is dynamically computed for realms backed by certain external authentication providers. For example, the username can be derived from part of the DN in an LDAP realm. It is in theory possible that two distinct users from the external system get mapped to the same username. Our recommendation is to avoid this situation in the first place. Hence, the resource sharing check does not account for this potential discrepancy.
53-
54+
* The username is dynamically computed for realms backed by certain external authentication providers. For example, the username can be derived from part of the DN in an LDAP realm. It is in theory possible that two distinct users from the external system get mapped to the same username. Our recommendation is to avoid this situation in the first place. Hence, the resource sharing check does not account for this potential discrepancy.

deploy-manage/toc.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -504,6 +504,7 @@ toc:
504504
- file: security/secure-clients-integrations.md
505505
children:
506506
- file: security/httprest-clients-security.md
507+
- file: security/limitations.md
507508
- file: users-roles.md
508509
children:
509510
- file: users-roles/cloud-organization.md

raw-migrated-files/cloud-on-k8s/cloud-on-k8s/index.md

Lines changed: 0 additions & 3 deletions
This file was deleted.

raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-securing-stack.md

Lines changed: 0 additions & 20 deletions
This file was deleted.

raw-migrated-files/cloud/cloud-enterprise/ece-securing-clusters.md

Lines changed: 0 additions & 24 deletions
This file was deleted.

raw-migrated-files/cloud/cloud-enterprise/ece-securing-ece.md

Lines changed: 0 additions & 14 deletions
This file was deleted.

raw-migrated-files/cloud/cloud-enterprise/index.md

Lines changed: 0 additions & 3 deletions
This file was deleted.

raw-migrated-files/cloud/cloud/ec-faq-technical.md

Lines changed: 0 additions & 30 deletions
This file was deleted.

raw-migrated-files/cloud/cloud/ec-security.md

Lines changed: 0 additions & 23 deletions
This file was deleted.

0 commit comments

Comments
 (0)