Skip to content

Commit fdfaeb9

Browse files
committed
Merge branch 'master' into develop
2 parents c06d627 + dac3300 commit fdfaeb9

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

details/fls-engine.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# FLS engine
22

3-
Applicable in the context of the [`fields` rule](elasticsearch#fields)
3+
Applicable in the context of the [`fields` rule](../elasticsearch.md#fields)
44

55
FLS engine specifies how ROR handles field-level security internally. Previously FLS was based entirely on [Lucene](https://en.wikipedia.org/wiki/Apache_Lucene) - that's why ROR needed to be installed on all nodes to make the `fields` rule work properly.
66
Now the `fields` rule is more flexible and part of FLS responsibilities is handled solely by ES. Increasing ES usage and reducing Lucene exploitation in FLS implementation makes the rule more efficient.

details/kibana-7.8.x-and-older.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -665,7 +665,7 @@ readonlyrest:
665665
signature_key: "my_shared_secret_kibana1_(min 256 chars)" # <- use environmental variables for better security!
666666
```
667667

668-
You may also use any custom claim from the OIDC `userinfo` token in ACL rules by using `{{jwt:assertion.<path_to_your_claim>}}` syntax. See the [Dynamic variables from JWT claims section](elasticsearch##usage-examples) for more information. ( **TIP** : Do not forget the `assertion` prefix in front of you jsonpath. )
668+
You may also use any custom claim from the OIDC `userinfo` token in ACL rules by using `{{jwt:assertion.<path_to_your_claim>}}` syntax. See the [Dynamic variables from JWT claims section](../elasticsearch.md#usage-examples) for more information. ( **TIP** : Do not forget the `assertion` prefix in front of you jsonpath. )
669669

670670
### Kibana side
671671

eck.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ metadata:
104104
name: config-readonlyrest.yml
105105
```
106106
107-
Notice that if you use ROR Enterprise, you can take advantage of the [Cluster-wide Settings](kibana#cluster-wide-settings-vs-readonlyrest.yml) functionality and reload configuration on all your nodes without restarting K8s' PODs.
107+
Notice that if you use ROR Enterprise, you can take advantage of the [Cluster-wide Settings](kibana.md#cluster-wide-settings-vs-readonlyrest.yml) functionality and reload configuration on all your nodes without restarting K8s' PODs.
108108
109109
#### Kibana node with ReadonlyREST plugin
110110

elasticsearch.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ The Elasticsearch plugin known as `ReadonlyREST Free` is released under the GPLv
88

99
Unlike the Elasticsearch plugin, the Kibana plugins are commercial only. But rely on the Elasticsearch plugin in order to work.
1010

11-
For a description of the Kibana plugins, skip to the [dedicated documentation page](kibana) instead.
11+
For a description of the Kibana plugins, skip to the [dedicated documentation page](kibana.md) instead.
1212

1313
### ReadonlyREST Free plugin for Elasticsearch
1414

@@ -437,7 +437,7 @@ _An Example of the Access Control List \(ACL\) made of 2 blocks._
437437

438438
The YAML snippet above, like all of this plugin's settings should be saved inside the `readonlyrest.yml` file. Create this file **on the same path where `elasticsearch.yml` is found**.
439439

440-
**TIP**: If you are a subscriber of the [PRO](https://readonlyrest.com/pro) or [Enterprise](https://readonlyrest.com/enterprise) Kibana plugin, you can edit and refresh the settings through a GUI. For more on this, see the [documentation for the ReadonlyREST plugin for Kibana](kibana).
440+
**TIP**: If you are a subscriber of the [PRO](https://readonlyrest.com/pro) or [Enterprise](https://readonlyrest.com/enterprise) Kibana plugin, you can edit and refresh the settings through a GUI. For more on this, see the [documentation for the ReadonlyREST plugin for Kibana](kibana.md).
441441

442442
### Encryption
443443

@@ -1211,7 +1211,7 @@ kibana:
12111211
##### `metadata`
12121212
([Enterprise](https://readonlyrest.com/enterprise))
12131213

1214-
User to define the Custom ROR Kibana Metadata which can be used in [Custom middleware](kibana#custom-middleware). The `kibana.metadata` in ReadonlyREST settings is an unstructured YAML object.
1214+
User to define the Custom ROR Kibana Metadata which can be used in [Custom middleware](kibana.md#custom-middleware). The `kibana.metadata` in ReadonlyREST settings is an unstructured YAML object.
12151215

12161216
It supports [dynamic variables](elasticsearch.md#dynamic-variables).
12171217

kibana.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1139,7 +1139,7 @@ readonlyrest:
11391139
signature_key: "my_shared_secret_kibana1_(min 256 chars)" # <- use environmental variables for better security!
11401140
```
11411141

1142-
You may also use any custom claim from the OIDC `userinfo` token in ACL rules by using `{{jwt:assertion.<path_to_your_claim>}}` syntax. See the [Dynamic variables from JWT claims section](elasticsearch##usage-examples) for more information. ( **TIP** : Do not forget the `assertion` prefix in front of you jsonpath. )
1142+
You may also use any custom claim from the OIDC `userinfo` token in ACL rules by using `{{jwt:assertion.<path_to_your_claim>}}` syntax. See the [Dynamic variables from JWT claims section](elasticsearch.md#usage-examples) for more information. ( **TIP** : Do not forget the `assertion` prefix in front of you jsonpath. )
11431143

11441144
### Kibana side
11451145

0 commit comments

Comments
 (0)