• Shield Reference for 2.x and 1.x:
  • Introduction
    • Have Comments, Questions, or Feedback?
  • Getting Started with Shield
    • Control Access with Basic Authentication
    • Enable Message Authentication
    • Enable Auditing
    • Moving On
  • Installing Shield
  • How Shield Works
  • User Authentication
    • How Authentication Works
    • Enabling Anonymous Access [1.1.0] Added in 1.1.0.
    • Native User Authentication
    • LDAP User Authentication
    • Active Directory User Authentication
    • PKI User Authentication [1.3.0] Added in 1.3.0.
    • File-based User Authentication
    • Integrating with Other Authentication Systems
    • Controlling the User Cache
    • Migration tool for users and roles
  • Role-based Access Control
    • Managing Roles
    • File-based Roles
    • Granting Privileges for Index Aliases
    • Mapping Users and Groups to Roles
    • Setting Up Field and Document Level Security
    • Submitting Requests on Behalf of Other Users
  • Auditing Security Events
  • Securing Communications with Encryption and IP Filtering
    • Setting Up SSL/TLS on a Cluster
    • Enabling Cipher Suites for Stronger Encryption
    • Separating node to node and client traffic
    • Using IP Filtering
  • Configuring Clients and Integrations
    • Using Elasticsearch Java Clients with Shield
    • Using Elasticsearch HTTP/REST Clients with Shield
    • Using Elasticsearch for Apache Hadoop with Shield
    • Using Logstash with Shield
    • Using Kibana with Shield
    • Using Reporting with Shield
    • Using Marvel with Shield
  • Managing Your License
  • Example Shield Deployments
  • Reference
    • Shield Privileges
    • Shield Settings
    • Shield Files
    • REST API
  • Limitations
  • Troubleshooting
  • Setting Up a Certificate Authority
  • Release Notes