Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kibana ssl configurations should be consistent with the rest of the stack #7777

Closed
epixa opened this issue Jul 20, 2016 · 1 comment
Closed

Comments

@epixa
Copy link
Contributor

epixa commented Jul 20, 2016

Each product in the stack handles TLS/SSL settings differently, but we should move toward consistency. Toward that end, we should update Kibana's SSL settings to be the following.

Description Setting Default Valid values
enabled setting ssl.enabled false true, false
verification mode ssl.verification_mode full none, certificate, full
supported protocols ssl.supported_protocols TLSv1.2, TLSv1.1, TLSv1 TLSv1, TLSv1.1, TLSv1.2
client authentication ssl.client_authentication none none, optional, required
cipher suites ssl.cipher_suites see list below language specific
certificate authorities ssl.certificate_authorities language/system trusted CAs array of paths to PEM encoded certificates
key ssl.key path to PEM encoded key file
key password/passphrase ssl.key_passphrase
certificate ssl.certificate path to file containing server certificate and optionally includes cert chain

All existing non-confirming configurations for SSL should be deprecated with a warning but should otherwise remain functional.

In Kibana, we need to do two different sets of configuration: one for the connection to the browser and one for the connection to elasticsearch. In each case, we should just prefix the relevant configurations as we already have been doing.

@kobelb
Copy link
Contributor

kobelb commented Feb 1, 2017

Closing as #9823 was Merged.

@kobelb kobelb closed this as completed Feb 1, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants