Skip to content

clean up security-related raw files #889

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Mar 21, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
29 changes: 2 additions & 27 deletions deploy-manage/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,6 @@ mapped_urls:
- https://www.elastic.co/guide/en/cloud-enterprise/current/ece-securing-ece.html
- https://www.elastic.co/guide/en/cloud-heroku/current/ech-security.html
- https://www.elastic.co/guide/en/kibana/current/using-kibana-with-security.html
- https://www.elastic.co/guide/en/elasticsearch/reference/current/security-limitations.html
- https://www.elastic.co/guide/en/elasticsearch/reference/current/es-security-principles.html
- https://www.elastic.co/guide/en/cloud/current/ec-faq-technical.html
---
Expand All @@ -25,26 +24,14 @@ mapped_urls:

% Note that the encryption happens at the file system level.

% We do provide [static IP ranges](../../../deploy-manage/security/elastic-cloud-static-ips.md), but they should be used with caution as noted in the documentation. IP addresses assigned to cloud resources can change without notice. This could be initiated by cloud providers with no knowledge to us. For this reason, we generally do not recommend that you use firewall rules to allow or restrict certain IP ranges. If you do wish to secure communication for deployment endpoints on {{ech}}, please use [Private Link](../../../deploy-manage/security/traffic-filtering.md). However, in situations where using Private Link services do not meet requirements (for example, secure traffic **from** Elastic Cloud), static IP ranges can be used.

% What needs to be done: Refine

% GitHub issue: https://github.com/elastic/docs-projects/issues/346

% Scope notes: this is just communication security - link to users + roles, spaces, monitoring, ++

% Use migrated content from existing pages that map to this page:

% - [ ] ./raw-migrated-files/elasticsearch/elasticsearch-reference/security-files.md
% Notes: redirect only
% - [ ] ./raw-migrated-files/elasticsearch/elasticsearch-reference/secure-cluster.md
% - [ ] ./raw-migrated-files/kibana/kibana/xpack-security.md
% - [ ] ./raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-securing-stack.md
% - [ ] ./raw-migrated-files/cloud/cloud-enterprise/ece-securing-ece.md
% - [ ] ./raw-migrated-files/cloud/cloud-heroku/ech-security.md
% - [ ] ./raw-migrated-files/kibana/kibana/using-kibana-with-security.md
% - [ ] ./raw-migrated-files/elasticsearch/elasticsearch-reference/security-limitations.md
% - [ ] ./raw-migrated-files/elasticsearch/elasticsearch-reference/es-security-principles.md
% - [ ] ./raw-migrated-files/cloud/cloud/ec-faq-technical.md

$$$field-document-limitations$$$

$$$alias-limitations$$$
Expand All @@ -59,18 +46,6 @@ $$$maintaining-audit-trail$$$
**This page is a work in progress.**
:::

% The documentation team is working to combine content pulled from the following pages:

% * [/raw-migrated-files/elasticsearch/elasticsearch-reference/security-files.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/security-files.md)
% * [/raw-migrated-files/elasticsearch/elasticsearch-reference/secure-cluster.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/secure-cluster.md)
% * [/raw-migrated-files/kibana/kibana/xpack-security.md](/raw-migrated-files/kibana/kibana/xpack-security.md)
% * [/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-securing-stack.md](/raw-migrated-files/cloud-on-k8s/cloud-on-k8s/k8s-securing-stack.md)
% * [/raw-migrated-files/cloud/cloud-enterprise/ece-securing-ece.md](/raw-migrated-files/cloud/cloud-enterprise/ece-securing-ece.md)
% * [/raw-migrated-files/cloud/cloud-heroku/ech-security.md](/raw-migrated-files/cloud/cloud-heroku/ech-security.md)
% * [/raw-migrated-files/kibana/kibana/using-kibana-with-security.md](/raw-migrated-files/kibana/kibana/using-kibana-with-security.md)
% * [/raw-migrated-files/elasticsearch/elasticsearch-reference/security-limitations.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/security-limitations.md)
% * [/raw-migrated-files/elasticsearch/elasticsearch-reference/es-security-principles.md](/raw-migrated-files/elasticsearch/elasticsearch-reference/es-security-principles.md)
% * [/raw-migrated-files/cloud/cloud/ec-faq-technical.md](/raw-migrated-files/cloud/cloud/ec-faq-technical.md)

# Security

Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,7 @@
---
navigation_title: "Limitations"
mapped_pages:
- https://www.elastic.co/guide/en/elasticsearch/reference/current/security-limitations.html
navigation_title: Limitations
---

# Security limitations [security-limitations]
Expand All @@ -23,7 +25,7 @@ Multi get and multi term vectors API throw IndexNotFoundException when trying to

## Filtered index aliases [_filtered_index_aliases]

Aliases containing filters are not a secure way to restrict access to individual documents, due to the limitations described in [Index and field names can be leaked when using aliases](../../../deploy-manage/security.md#alias-limitations). The {{stack-security-features}} provide a secure way to restrict access to documents through the [document-level security](../../../deploy-manage/users-roles/cluster-or-deployment-auth/controlling-access-at-document-field-level.md) feature.
Aliases containing filters are not a secure way to restrict access to individual documents, due to the limitations described in [Index and field names can be leaked when using aliases](/deploy-manage/security.md#alias-limitations). The {{stack-security-features}} provide a secure way to restrict access to documents through the [document-level security](/deploy-manage/users-roles/cluster-or-deployment-auth/controlling-access-at-document-field-level.md) feature.


## Field and document level security limitations [field-document-limitations]
Expand All @@ -40,7 +42,7 @@ Until this limitation is addressed, avoid index and field names that contain con

## LDAP realm [_ldap_realm]

The [LDAP Realm](../../../deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md) does not currently support the discovery of nested LDAP Groups. For example, if a user is a member of `group_1` and `group_1` is a member of `group_2`, only `group_1` will be discovered. However, the [Active Directory Realm](../../../deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md) **does** support transitive group membership.
The [LDAP Realm](/deploy-manage/users-roles/cluster-or-deployment-auth/ldap.md) does not currently support the discovery of nested LDAP Groups. For example, if a user is a member of `group_1` and `group_1` is a member of `group_2`, only `group_1` will be discovered. However, the [Active Directory Realm](/deploy-manage/users-roles/cluster-or-deployment-auth/active-directory.md) **does** support transitive group membership.


## Resource sharing check for users and API keys [can-access-resources-check]
Expand All @@ -49,5 +51,4 @@ The result of [async search](https://www.elastic.co/docs/api/doc/elasticsearch/o

* Two different realms can have the same name on different nodes. This is not a recommended way to configure realms, therefore the resource sharing check does not attempt to detect this inconsistency.
* Realms can be renamed. This can cause inconsistency for the resource sharing check when you submit an async search or scroll then rename the realm and try to retrieve the results. Hence, changing realm names should be handled with care since it can cause complications for more than just the resource sharing check.
* The username is dynamically computed for realms backed by certain external authentication providers. For example, the username can be derived from part of the DN in an LDAP realm. It is in theory possible that two distinct users from the external system get mapped to the same username. Our recommendation is to avoid this situation in the first place. Hence, the resource sharing check does not account for this potential discrepancy.

* The username is dynamically computed for realms backed by certain external authentication providers. For example, the username can be derived from part of the DN in an LDAP realm. It is in theory possible that two distinct users from the external system get mapped to the same username. Our recommendation is to avoid this situation in the first place. Hence, the resource sharing check does not account for this potential discrepancy.
1 change: 1 addition & 0 deletions deploy-manage/toc.yml
Original file line number Diff line number Diff line change
Expand Up @@ -504,6 +504,7 @@ toc:
- file: security/secure-clients-integrations.md
children:
- file: security/httprest-clients-security.md
- file: security/limitations.md
- file: users-roles.md
children:
- file: users-roles/cloud-organization.md
Expand Down
3 changes: 0 additions & 3 deletions raw-migrated-files/cloud-on-k8s/cloud-on-k8s/index.md

This file was deleted.

This file was deleted.

This file was deleted.

14 changes: 0 additions & 14 deletions raw-migrated-files/cloud/cloud-enterprise/ece-securing-ece.md

This file was deleted.

3 changes: 0 additions & 3 deletions raw-migrated-files/cloud/cloud-enterprise/index.md

This file was deleted.

30 changes: 0 additions & 30 deletions raw-migrated-files/cloud/cloud/ec-faq-technical.md

This file was deleted.

23 changes: 0 additions & 23 deletions raw-migrated-files/cloud/cloud/ec-security.md

This file was deleted.

Loading
Loading