You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
.ServerCertificateValidationCallback(CertificateValidations.DenyAll);// <1> synonymous with the previous lambda expression
59
+
.ServerCertificateValidationCallback(CertificateValidations.DenyAll);// <1> use a lambda expression or `CertificateValidations.DenyAll` to deny all validation
.ServerCertificateValidationCallback(CertificateValidations.AllowAll);// <1> use a lambda expression or `CertificateValidations.AllowAll` to allow all validation
* X-Pack also allows you to configure a {xpack_current}/pki-realm.html[PKI realm] to enable user authentication
180
-
* through client certificates. The {ref_current}/certutil.html[+certutil+ tool] included with X-Pack allows you to
181
-
* generate client certificates as well and assign the distinguished name (DN) of the
182
-
* certificate to a user with a certain role.
177
+
* Elastic Stack Security features allow you to configure a {ref_current}/configuring-pki-realm.html[PKI realm] to enable user authentication
178
+
* through client certificates. The {ref_current}/certutil.html[+elasticsearch-certutil+ tool] included with the default distribution
179
+
* allows you to generate client certificates as well and assign the distinguished name (DN) of the certificate to a user with a certain role.
183
180
*
184
-
* By default, the `certutil` tool only generates a public certificate (`.cer`) and a private key `.key`. To authenticate with client certificates, you need to present both
185
-
* as one certificate. The easiest way to do this is to generate a `pfx` or `p12` file from the `.cer` and `.key`
186
-
* and attach these to requests using `new X509Certificate(pathToPfx)`.
181
+
* By default, the `elasticsearch-certutil` tool only generates a public certificate (`.cer`) and a private key `.key`.
182
+
* To authenticate with client certificates, you need to present both as one certificate. The easiest way to do this is to generate a `pfx`
183
+
* or `p12` file from the `.cer` and `.key` and attach these to requests using `new X509Certificate(pathToPfx)`.
187
184
*
188
185
* If you do not have a way to run `openssl` or `Pvk2Pfx` to do this as part of your deployments the clients ships with a handy helper to generate one
189
186
* on the fly by passing the paths to the `.cer` and `.key` files that `certutil` outputs. Sadly, this functonality is not available on .NET Core because
@@ -237,9 +234,7 @@ public class BadPkiCluster : WorkingWithCertificates.PkiCluster
0 commit comments