Skip to content

Commit 4686472

Browse files
authored
[DOCS] Add Webhook connector SSL authentication configuration details (#163983)
1 parent 505d826 commit 4686472

6 files changed

Lines changed: 61 additions & 49 deletions

File tree

docs/api-generated/connectors/connector-apis-passthru.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1459,7 +1459,7 @@ Any modifications made to this file will be overwritten.
14591459
<div class="param">authType (optional)</div><div class="param-desc"><span class="param-type"><a href="#string">String</a></span> The type of authentication to use: basic, SSL, or none. </div>
14601460
<div class="param-enum-header">Enum:</div>
14611461
<div class="param-enum">webhook-authentication-basic</div><div class="param-enum">webhook-authentication-ssl</div><div class="param-enum">null</div>
1462-
<div class="param">ca (optional)</div><div class="param-desc"><span class="param-type"><a href="#string">String</a></span> A base64 encoded version of the certificate authority file, which is used to sign and validate certificates. </div>
1462+
<div class="param">ca (optional)</div><div class="param-desc"><span class="param-type"><a href="#string">String</a></span> A base64 encoded version of the certificate authority file that the connector can trust to sign and validate certificates. This option is available for all authentication types. </div>
14631463
<div class="param">certType (optional)</div><div class="param-desc"><span class="param-type"><a href="#string">String</a></span> If the <code>authType</code> is <code>webhook-authentication-ssl</code>, specifies whether the certificate authentication data is in a CRT and key file format or a PFX file format. </div>
14641464
<div class="param-enum-header">Enum:</div>
14651465
<div class="param-enum">ssl-crt-key</div><div class="param-enum">ssl-pfx</div>
@@ -1469,7 +1469,7 @@ Any modifications made to this file will be overwritten.
14691469
<div class="param-enum-header">Enum:</div>
14701470
<div class="param-enum">post</div><div class="param-enum">put</div>
14711471
<div class="param">url (optional)</div><div class="param-desc"><span class="param-type"><a href="#string">String</a></span> The request URL. If you are using the <code>xpack.actions.allowedHosts</code> setting, add the hostname to the allowed hosts. </div>
1472-
<div class="param">verificationMode (optional)</div><div class="param-desc"><span class="param-type"><a href="#string">String</a></span> Controls the verification of certificates. Use <code>full</code> to validate that the provided certificate has an issue date that is within the <code>not_before</code> and <code>not_after</code> dates, chains to a trusted certificate authority (CA), and has a hostname or IP address that matches the names within the certificate. Use <code>certificate</code> to validate the provided certificate and verifies that it is signed by a trusted authority; this option does not check the certificate hostname. Use <code>none</code> to skip certificate validation. </div>
1472+
<div class="param">verificationMode (optional)</div><div class="param-desc"><span class="param-type"><a href="#string">String</a></span> Controls the verification of certificates. Use <code>full</code> to validate that the certificate has an issue date within the <code>not_before</code> and <code>not_after</code> dates, chains to a trusted certificate authority (CA), and has a hostname or IP address that matches the names within the certificate. Use <code>certificate</code> to validate the certificate and verify that it is signed by a trusted authority; this option does not check the certificate hostname. Use <code>none</code> to skip certificate validation. </div>
14731473
<div class="param-enum-header">Enum:</div>
14741474
<div class="param-enum">certificate</div><div class="param-enum">full</div><div class="param-enum">none</div>
14751475
</div> <!-- field-items -->

docs/management/connectors/action-types/webhook.asciidoc

Lines changed: 18 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -28,49 +28,27 @@ image::management/connectors/images/webhook-connector.png[Webhook connector]
2828
Webhook connectors have the following configuration properties:
2929

3030
Name:: The name of the connector.
31-
URL:: The request URL. If you are using the <<action-settings, `xpack.actions.allowedHosts`>> setting, make sure the hostname is added to the allowed hosts.
32-
Method:: HTTP request method, either `post`(default) or `put`.
33-
Headers:: A set of key-value pairs sent as headers with the request
34-
Require authentication:: If true, a username and password for login type authentication must be provided.
35-
Username:: Username for HTTP basic authentication.
36-
Password:: Password for HTTP basic authentication.
37-
38-
[float]
39-
[[preconfigured-webhook-configuration]]
40-
=== Create preconfigured connectors
41-
42-
If you are running {kib} on-prem, you can define connectors by
43-
adding `xpack.actions.preconfigured` settings to your `kibana.yml` file.
44-
For example:
45-
46-
[source,text]
31+
Method:: The HTTP request method, either `post`(default) or `put`.
32+
URL:: The request URL. If you are using the <<action-settings,`xpack.actions.allowedHosts`>> setting, make sure the hostname is added to the allowed hosts.
33+
Authentication::
34+
The authentication type: none, basic, or SSL.
35+
If you choose basic authentication, you must provide a user name and password.
36+
If you choose SSL authentication, you must provide SSL server certificate authentication data in a CRT and key file format or a PFX file format. You can also optionally provide a passphrase if the files are password-protected.
37+
HTTP headers:: A set of key-value pairs sent as headers with the request.
38+
Certificate authority::
39+
A certificate authority (CA) that the connector can trust, for example to sign and validate server certificates.
40+
This option is available for all authentication types.
41+
CA file:::
42+
The certificate authority file.
43+
Verification mode:::
44+
Controls the certificate verification.
45+
+
4746
--
48-
xpack.actions.preconfigured:
49-
my-webhook:
50-
name: preconfigured-webhook-connector-type
51-
actionTypeId: .webhook
52-
config:
53-
url: https://test.host
54-
method: post
55-
headers:
56-
testheader: testvalue
57-
secrets:
58-
user: testuser
59-
password: passwordkeystorevalue
47+
* Use `full` to validate that the certificate has an issue date within the `not_before` and `not_after` dates, chains to a trusted certificate authority, and has a hostname or IP address that matches the names within the certificate.
48+
* Use `certificate` to validate the certificate and verifies that it is signed by a trusted authority; this option does not check the certificate hostname.
49+
* Use `none` to skip certificate validation.
6050
--
6151

62-
Config defines information for the connector type.
63-
64-
`url`:: A URL string that corresponds to *URL*.
65-
`method`:: A string that corresponds to *Method*.
66-
`headers`:: A record<string, string> that corresponds to *Headers*.
67-
`hasAuth`:: A boolean that corresponds to *Requires authentication*. If `true`, this connector will require values for `user` and `password` inside the secrets configuration. Defaults to `true`.
68-
69-
Secrets defines sensitive information for the connector type.
70-
71-
`user`:: A string that corresponds to *User*. Required if `hasAuth` is set to `true`.
72-
`password`:: A string that corresponds to *Password*. Should be stored in the <<creating-keystore, {kib} keystore>>. Required if `hasAuth` is set to `true`.
73-
7452
[float]
7553
[[webhook-action-configuration]]
7654
=== Test connectors

docs/management/connectors/pre-configured-connectors.asciidoc

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,3 +80,34 @@ image::images/preconfigured-connectors-managing.png[Connectors managing tab with
8080
Clicking a preconfigured connector shows the description, but not the
8181
configuration.
8282

83+
[float]
84+
[[preconfigured-webhook-configuration]]
85+
=== Webhook preconfigured connector example
86+
87+
The following example creates a <<webhook-action-type,webhook connector>> with basic authentication:
88+
89+
[source,text]
90+
--
91+
xpack.actions.preconfigured:
92+
my-webhook:
93+
name: preconfigured-webhook-connector-type
94+
actionTypeId: .webhook
95+
config:
96+
url: https://test.host <1>
97+
method: post <2>
98+
headers: <3>
99+
testheader: testvalue
100+
hasAuth: true <4>
101+
secrets:
102+
user: testuser <5>
103+
password: passwordkeystorevalue <6>
104+
--
105+
106+
<1> The web service request URL. If you are using the <<action-settings,`xpack.actions.allowedHosts`>> setting, make sure the hostname is added to the allowed hosts.
107+
<2> The HTTP request method, either `post`(default) or `put`.
108+
<3> A set of key-value pairs sent as headers with the request.
109+
<4> If `true`, this connector will require values for `user` and `password` inside the secrets configuration. Defaults to `true`.
110+
<5> A valid user name. Required if `hasAuth` is set to `true`.
111+
<6> A valid password. Required if `hasAuth` is set to `true`. NOTE: This value should be stored in the <<creating-keystore,{kib} keystore>>.
112+
113+
NOTE: SSL authentication is not supported in preconfigured webhook connectors.

x-pack/plugins/actions/docs/openapi/bundled.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2621,7 +2621,7 @@
26212621
},
26222622
"ca": {
26232623
"type": "string",
2624-
"description": "A base64 encoded version of the certificate authority file, which is used to sign and validate certificates."
2624+
"description": "A base64 encoded version of the certificate authority file that the connector can trust to sign and validate certificates. This option is available for all authentication types.\n"
26252625
},
26262626
"certType": {
26272627
"type": "string",
@@ -2661,7 +2661,7 @@
26612661
"none"
26622662
],
26632663
"default": "full",
2664-
"description": "Controls the verification of certificates. Use `full` to validate that the provided certificate has an issue date that is within the `not_before` and `not_after` dates, chains to a trusted certificate authority (CA), and has a hostname or IP address that matches the names within the certificate. Use `certificate` to validate the provided certificate and verifies that it is signed by a trusted authority; this option does not check the certificate hostname. Use `none` to skip certificate validation.\n"
2664+
"description": "Controls the verification of certificates. Use `full` to validate that the certificate has an issue date within the `not_before` and `not_after` dates, chains to a trusted certificate authority (CA), and has a hostname or IP address that matches the names within the certificate. Use `certificate` to validate the certificate and verify that it is signed by a trusted authority; this option does not check the certificate hostname. Use `none` to skip certificate validation.\n"
26652665
}
26662666
}
26672667
},

x-pack/plugins/actions/docs/openapi/bundled.yaml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1768,7 +1768,8 @@ components:
17681768
The type of authentication to use: basic, SSL, or none.
17691769
ca:
17701770
type: string
1771-
description: A base64 encoded version of the certificate authority file, which is used to sign and validate certificates.
1771+
description: |
1772+
A base64 encoded version of the certificate authority file that the connector can trust to sign and validate certificates. This option is available for all authentication types.
17721773
certType:
17731774
type: string
17741775
description: |
@@ -1804,7 +1805,7 @@ components:
18041805
- none
18051806
default: full
18061807
description: |
1807-
Controls the verification of certificates. Use `full` to validate that the provided certificate has an issue date that is within the `not_before` and `not_after` dates, chains to a trusted certificate authority (CA), and has a hostname or IP address that matches the names within the certificate. Use `certificate` to validate the provided certificate and verifies that it is signed by a trusted authority; this option does not check the certificate hostname. Use `none` to skip certificate validation.
1808+
Controls the verification of certificates. Use `full` to validate that the certificate has an issue date within the `not_before` and `not_after` dates, chains to a trusted certificate authority (CA), and has a hostname or IP address that matches the names within the certificate. Use `certificate` to validate the certificate and verify that it is signed by a trusted authority; this option does not check the certificate hostname. Use `none` to skip certificate validation.
18081809
secrets_properties_webhook:
18091810
title: Connector secrets properties for a Webhook connector
18101811
description: Defines secrets for connectors when type is `.webhook`.

x-pack/plugins/actions/docs/openapi/components/schemas/config_properties_webhook.yaml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,9 @@ properties:
1212
The type of authentication to use: basic, SSL, or none.
1313
ca:
1414
type: string
15-
description: A base64 encoded version of the certificate authority file, which is used to sign and validate certificates.
15+
description: >
16+
A base64 encoded version of the certificate authority file that the connector can trust to sign and validate certificates.
17+
This option is available for all authentication types.
1618
certType:
1719
type: string
1820
description: >
@@ -50,6 +52,6 @@ properties:
5052
default: full
5153
description: >
5254
Controls the verification of certificates.
53-
Use `full` to validate that the provided certificate has an issue date that is within the `not_before` and `not_after` dates, chains to a trusted certificate authority (CA), and has a hostname or IP address that matches the names within the certificate.
54-
Use `certificate` to validate the provided certificate and verifies that it is signed by a trusted authority; this option does not check the certificate hostname.
55+
Use `full` to validate that the certificate has an issue date within the `not_before` and `not_after` dates, chains to a trusted certificate authority (CA), and has a hostname or IP address that matches the names within the certificate.
56+
Use `certificate` to validate the certificate and verify that it is signed by a trusted authority; this option does not check the certificate hostname.
5557
Use `none` to skip certificate validation.

0 commit comments

Comments
 (0)