diff --git a/docs/development/security/rbac.asciidoc b/docs/development/security/rbac.asciidoc index 900def1bc1ab7b..a3508b8aced355 100644 --- a/docs/development/security/rbac.asciidoc +++ b/docs/development/security/rbac.asciidoc @@ -70,7 +70,8 @@ The application is created by concatenating the prefix of `kibana-` with the val } ---------------------------------- -Roles that grant <> should be managed using the <> or the *Management* / *Security* / *Roles* page, not directly using the {es} {ref}/security-api.html#security-role-apis[role management API]. This role can then be assigned to users using {es}'s {ref}/security-api-users.html[User Management APIs]. +Roles that grant <> should be managed using the <> or the *Management* / *Security* / *Roles* page, not directly using the {es} {ref}/security-api.html#security-role-apis[role management API]. This role can then be assigned to users using the {es} +{ref}/security-api.html#security-user-apis[user management APIs]. [[development-rbac-authorization]] ==== Authorization diff --git a/docs/security/securing-kibana.asciidoc b/docs/security/securing-kibana.asciidoc index f9e587f16dea8d..e3673a67537880 100644 --- a/docs/security/securing-kibana.asciidoc +++ b/docs/security/securing-kibana.asciidoc @@ -85,7 +85,7 @@ You can manage privileges on the *Management / Security / Roles* page in {kib}. If you're using the native realm with Basic Authentication, you can assign roles using the *Management / Security / Users* page in {kib} or the -{ref}/security-api-users.html[User Management API]. For example, the following +{ref}/security-api.html#security-user-apis[user management APIs]. For example, the following creates a user named `jacknich` and assigns it the `kibana_user` role: [source,js]