• Shield Reference for 2.x and 1.x:
  • Introduction
    • Have Comments, Questions, or Feedback?
  • Getting Started with Shield
    • Control Access with Basic Authentication
    • Enable Message Authentication
    • Enable Auditing
    • Moving On
  • How Shield Works
  • Installing Shield
  • Setting Up User Authentication
    • Enabling Anonymous Access [1.1.0] Added in 1.1.0.
    • Configuring an esusers Realm
    • Configuring an LDAP Realm
    • Configuring an Active Directory Realm
    • Configuring a PKI Realm
  • Managing Users in an esusers Realm
  • Configuring Role-based Access Control
    • Defining Roles
    • Granting Privileges for Specific Actions
    • Granting Privileges for Indices & Aliases
    • Mapping Users and Groups to Roles
  • Configuring Auditing
  • Securing Communications with Encryption and IP Filtering
    • Setting Up SSL/TLS on a Cluster
    • Enabling Cipher Suites for Stronger Encryption
    • Separating node to node and client traffic
    • Using IP Filtering
  • Configuring Clients and Integrations
    • Using Elasticsearch Java Clients with Shield
    • Using Elasticsearch HTTP/REST Clients with Shield
    • Using Elasticsearch for Apache Hadoop with Shield
    • Using Logstash with Shield
    • Using Marvel with Shield
    • Using Kibana with Shield
  • Managing Shield Licenses
  • Example Shield Deployments
  • Reference
  • Limitations
  • Troubleshooting
  • Setting Up a Certificate Authority
  • Release Notes