Skip to content

Commit 59db513

Browse files
committed
[DOCS] Adds missing security anchors (elastic#47585)
1 parent 6c4f82a commit 59db513

File tree

2 files changed

+2
-1
lines changed

2 files changed

+2
-1
lines changed

x-pack/docs/en/security/authentication/oidc-guide.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -552,7 +552,7 @@ OP or a third party (see <<third-party-login>>). In order to do so, you must exp
552552
OpenID Connect authentication endpoint within {kib}, so that the {kib} server will
553553
not reject these external messages.
554554

555-
555+
[[oidc-without-kibana]]
556556
=== OpenID Connect without {kib}
557557

558558
The OpenID Connect realm is designed to allow users to authenticate to {kib} and as

x-pack/docs/en/security/authentication/saml-guide.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -834,6 +834,7 @@ It is possible to have one or more {kib} instances that use SAML, while other
834834
instances use basic authentication against another realm type (e.g.
835835
<<native-realm, Native>> or <<ldap-realm, LDAP>>).
836836

837+
[[saml-troubleshooting]]
837838
=== Troubleshooting SAML Realm Configuration
838839

839840
The SAML 2.0 specification offers a lot of options and flexibility for the implementers

0 commit comments

Comments
 (0)