Skip to content

Commit cfd0c08

Browse files
committed
[DOCS] Adds missing security anchors (elastic#47585)
1 parent bb2c6ba commit cfd0c08

File tree

2 files changed

+2
-1
lines changed

2 files changed

+2
-1
lines changed

x-pack/docs/en/security/authentication/oidc-guide.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -557,7 +557,7 @@ OP or a third party (see <<third-party-login>>, we need to explicitly _whitelist
557557
OpenID Connect authentication endpoint within {kib}, so that the {kib} server will
558558
not reject these external messages.
559559

560-
560+
[[oidc-without-kibana]]
561561
=== OpenID Connect without {kib}
562562

563563
The OpenID Connect realm is designed to allow users to authenticate to {kib} and as

x-pack/docs/en/security/authentication/saml-guide.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -863,6 +863,7 @@ It is possible to have one or more {kib} instances that use SAML, while other
863863
instances use basic authentication against another realm type (e.g.
864864
<<native-realm, Native>> or <<ldap-realm, LDAP>>).
865865

866+
[[saml-troubleshooting]]
866867
=== Troubleshooting SAML Realm Configuration
867868

868869
The SAML 2.0 specification offers a lot of options and flexibility for the implementers

0 commit comments

Comments
 (0)