Skip to content

Commit 8f3583c

Browse files
Merge branch '7.5' into backport/7.5/fix-Index-template-editor-should-support-mappings-types
2 parents fd675f8 + e6d89f6 commit 8f3583c

3 files changed

Lines changed: 14 additions & 14 deletions

File tree

docs/api/saved-objects/import.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Import an index pattern and dashboard:
4949

5050
[source,js]
5151
--------------------------------------------------
52-
$ curl -X POST "localhost:5601/api/saved_objects/_import" -H "kbn-xsrf: true" --form file=@file.ndjson <1>
52+
$ curl -X POST "localhost:5601/api/saved_objects/_import" -H "kbn-xsrf: true" --form file=@file.ndjson
5353
--------------------------------------------------
5454

5555
The `file.ndjson` file contains the following:

docs/user/security/authentication/index.asciidoc

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[role="xpack"]
22
[[kibana-authentication]]
3-
=== Authentication in Kibana
3+
=== Authentication in {kib}
44
++++
55
<titleabbrev>Authentication</titleabbrev>
66
++++
@@ -16,23 +16,23 @@
1616
[[basic-authentication]]
1717
==== Basic authentication
1818

19-
Basic authentication requires a username and password to successfully log in to {kib}. It is enabled by default and based on the Native security realm provided by {es}. The basic authentication provider uses a Kibana provided login form, and supports authentication using the `Authorization` request header's `Basic` scheme.
19+
To successfully log in to {kib}, basic authentication requires a username and password. Basic authentication is enabled by default, and is based on the Native security realm or LDAP security realm that is provided by {es}. The basic authentication provider uses a {kib} provided login form, and supports authentication using the `Authorization` request header `Basic` scheme.
2020

21-
The session cookies that are issued by the basic authentication provider are stateless. Therefore, logging out of Kibana when using the basic authentication provider clears the session cookies from the browser but does not invalidate the session cookie for reuse.
21+
The session cookies that are issued by the basic authentication provider are stateless. Therefore, logging out of {kib} when using the basic authentication provider clears the session cookies from the browser, but does not invalidate the session cookie for reuse.
2222

2323
For more information about basic authentication and built-in users, see
2424
{ref}/setting-up-authentication.html[User authentication].
2525

2626
[[token-authentication]]
2727
==== Token authentication
2828

29-
Token authentication allows users to login using the same Kibana provided login form as basic authentication. The token authentication provider is built on {es}'s token APIs. The bearer tokens returned by {es}'s {ref}/security-api-get-token.html[get token API] can be used directly with Kibana using the `Authorization` request header with the `Bearer` scheme.
29+
Token authentication allows users to login using the same {kib} provided login form as basic authentication, and is based on the Native security realm or LDAP security realm that is provided by {es}. The token authentication provider is built on {es} token APIs. The bearer tokens returned by {es}'s {ref}/security-api-get-token.html[get token API] can be used directly with {kib} using the `Authorization` request header with the `Bearer` scheme.
3030

31-
The session cookies that are issued by the token authentication provider are stateful, and logging out of Kibana invalidates the session cookies for reuse.
31+
The session cookies that are issued by the token authentication provider are stateful, and logging out of {kib} invalidates the session cookies for reuse.
3232

33-
Prior to configuring Kibana, ensure token support is enabled in Elasticsearch. See the {ref}/security-api-get-token.html[Elasticsearch token API] documentation for more information.
33+
Prior to configuring {kib}, ensure token support is enabled in {es}. See the {ref}/security-api-get-token.html[{es} token API] documentation for more information.
3434

35-
To enable the token authentication provider in Kibana, set the following value in your `kibana.yml`:
35+
To enable the token authentication provider in {kib}, set the following value in your `kibana.yml`:
3636

3737
[source,yaml]
3838
--------------------------------------------------------------------------------
@@ -125,7 +125,7 @@ Basic authentication is supported _only_ if `basic` authentication provider is e
125125

126126
At the beginning of the SAML handshake, {kib} stores the initial URL in the session cookie, so it can redirect the user back to that URL after successful SAML authentication.
127127
If the URL is long, the session cookie might exceed the maximum size supported by the browser--typically 4KB for all cookies per domain. When this happens, the session cookie is truncated,
128-
or dropped completely, and you might experience sporadic failures during SAML authentication.
128+
or dropped completely, and you might experience sporadic failures during SAML authentication.
129129

130130
To remedy this issue, you can decrease the maximum
131131
size of the URL that {kib} is allowed to store during the SAML handshake. The default value is 2KB.
@@ -182,15 +182,15 @@ Users will be able to access the login page and use Basic authentication by navi
182182
[float]
183183
==== Single sign-on provider details
184184

185-
The following sections apply both to <<saml>> and <<oidc>>
185+
The following sections apply both to <<saml>> and <<oidc>>
186186

187187
[float]
188188
===== Access and refresh tokens
189189

190190
Once the user logs in to {kib} Single Sign-On, either using SAML or OpenID Connect, {es} issues access and refresh tokens
191191
that {kib} encrypts and stores them in its own session cookie. This way, the user isn't redirected to the Identity Provider
192-
for every request that requires authentication. It also means that the {kib} session depends on the `xpack.security.sessionTimeout`
193-
setting and the user is automatically logged out if the session expires. An access token that is stored in the session cookie
192+
for every request that requires authentication. It also means that the {kib} session depends on the `xpack.security.sessionTimeout`
193+
setting and the user is automatically logged out if the session expires. An access token that is stored in the session cookie
194194
can expire, in which case {kib} will automatically renew it with a one-time-use refresh token and store it in the same cookie.
195195

196196
{kib} can only determine if an access token has expired if it receives a request that requires authentication. If both access

docs/visualize/timelion.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,7 @@ Customize and format the visualization using functions:
256256
----------------------------------
257257
.es(index=metricbeat*,
258258
timefield=@timestamp,
259-
metric=max:system.network.in.byte)
259+
metric=max:system.network.in.bytes)
260260
.derivative()
261261
.divide(1048576)
262262
.lines(fill=2, width=1)
@@ -270,7 +270,7 @@ Customize and format the visualization using functions:
270270
.multiply(-1)
271271
.divide(1048576)
272272
.lines(fill=2, width=1) <3>
273-
.color(blue) < <4>
273+
.color(blue) <4>
274274
.label("Outbound traffic")
275275
.legend(columns=2, position=nw) <5>
276276
----------------------------------

0 commit comments

Comments
 (0)