-
Notifications
You must be signed in to change notification settings - Fork 25.6k
Add note in breaking changes for nameid_format #77785
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 4 commits
a4a2a09
345008d
82e2a87
306a786
50ca91a
f8bffd5
88c7f75
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
@@ -234,7 +234,7 @@ on startup. | |||||||||||||||||
|
|
||||||||||||||||||
| [discrete] | ||||||||||||||||||
| [[ssl-misc-changes]] | ||||||||||||||||||
| ===== Other SSL/TLS changes | ||||||||||||||||||
| ===== Other SSL/TLS changes | ||||||||||||||||||
|
|
||||||||||||||||||
| .PKCS#11 keystores and trustores cannot be configured in `elasticsearch.yml` | ||||||||||||||||||
| [%collapsible] | ||||||||||||||||||
|
|
@@ -254,7 +254,7 @@ Use of a PKCS#11 keystore or truststore as the JRE's default store is not affect | |||||||||||||||||
|
|
||||||||||||||||||
| *Impact* + | ||||||||||||||||||
| If you have a PKCS#11 keystore configured within your `elasticsearch.yml` file, you must remove that | ||||||||||||||||||
| configuration and switch to a supported keystore type, or configure your PKCS#11 keystore as the | ||||||||||||||||||
| configuration and switch to a supported keystore type, or configure your PKCS#11 keystore as the | ||||||||||||||||||
| JRE default store. | ||||||||||||||||||
| ==== | ||||||||||||||||||
|
|
||||||||||||||||||
|
|
@@ -306,6 +306,38 @@ renamed to better reflect its intended use. | |||||||||||||||||
| *Impact* + | ||||||||||||||||||
| Assign users with the `kibana_user` role to the `kibana_admin` role. | ||||||||||||||||||
| Discontinue use of the `kibana_user` role. | ||||||||||||||||||
| ==== | ||||||||||||||||||
|
|
||||||||||||||||||
| [discrete] | ||||||||||||||||||
| [[saml-realm-nameid-changes]] | ||||||||||||||||||
| ===== The default value of `nameid_format` setting has been removed. | ||||||||||||||||||
|
|
||||||||||||||||||
| .The `nameid_format` SAML realm setting has no default value. | ||||||||||||||||||
| [%collapsible] | ||||||||||||||||||
| ==== | ||||||||||||||||||
| *Details* + | ||||||||||||||||||
| In SAML, Identity Providers (IdPs) either release a `NameID` or attempt to | ||||||||||||||||||
| conform with the requirements of a Service Provider (SP). The SP declares its | ||||||||||||||||||
| requirements in the `NameIDPolicy` of an authentication request. In {es}, the | ||||||||||||||||||
| `nameid_format` SAML realm setting controls the `NameIDPolicy`. | ||||||||||||||||||
|
||||||||||||||||||
| In SAML, Identity Providers (IdPs) either release a `NameID` or attempt to | |
| conform with the requirements of a Service Provider (SP). The SP declares its | |
| requirements in the `NameIDPolicy` of an authentication request. In {es}, the | |
| `nameid_format` SAML realm setting controls the `NameIDPolicy`. | |
| In SAML, Identity Providers (IdPs) can be either statically configured to release a `NameID` | |
| with a specific format, or configured to try to conform with the requirements of Service Provider (SP) | |
| The SP declares its requirements in the `NameIDPolicy` element of a SAML Authentication Request. | |
| In {es}, the `nameid_format` SAML realm setting controls the `NameIDPolicy` value. |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| The default value has now been removed. This means that {es} will be default | |
| The default value has now been removed. This means that {es} will by default |
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wonder if we can remove the second sentence.
| The default value has now been removed. This means that {es} will be default | |
| create SAML Authentication Requests that do not put forward such requirements | |
| to the Identity Provider. | |
| If you want to retain the previous behavior, you can set `nameid_format` | |
| to `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`. | |
| This default has been removed. To retain the previous default behavior, set | |
| `nameid_format` to `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think it makes sense to remove this. This is the essence of what changes and what this change means.
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is not what I am trying to say. If we instruct everyone to set this value, we might as well leave the default in place. What I am trying to say is that "this should probably be ok, but if you know you want the old behavior or you don't know how your IDP is configured but it was working so far and you don't care to try, set this setting to this value explicitly"
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd remove this heading (keep the anchor) and relocate these changes just below the section for
The transport.profiles.*.xpack.security.type setting has been removed.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agreed! I'll implement that change.