You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Flag that indicates if the provider should have an entry on the Login Selector UI. Setting this to `false` doesn't remove the provider from the authentication chain.
98
98
99
99
2+a|
@@ -104,7 +104,7 @@ You are unable to set this setting to `false` for `basic` and `token` authentica
| Determines if the provider should treat the `RelayState` parameter as a deep link in {kib} during Identity Provider initiated log in. By default, this setting is set to `false`. The link specified in `RelayState` should be a relative, URL-encoded {kib} URL. For example, the `/app/dashboards#/list` link in `RelayState` parameter would look like this: `RelayState=%2Fapp%2Fdashboards%23%2Flist`.
127
127
128
128
|===
@@ -136,7 +136,7 @@ In addition to <<authentication-provider-settings,the settings that are valid fo
136
136
[cols="2*<"]
137
137
|===
138
138
| `xpack.security.authc.providers.`
139
-
`oidc.<provider-name>.realm`
139
+
`oidc.<provider-name>.realm` {ess-icon}
140
140
| OpenID Connect realm in {es} that the provider should use.
141
141
142
142
|===
@@ -168,13 +168,13 @@ You can configure the following settings in the `kibana.yml` file.
| Determines if the login selector UI should be enabled. By default, this setting is set to `true` if more than one authentication provider is configured.
179
179
180
180
|===
@@ -203,12 +203,12 @@ You can configure the following settings in the `kibana.yml` file.
203
203
this to `true` if SSL is configured outside of {kib} (for example, you are
204
204
routing requests through a load balancer or proxy).
205
205
206
-
| `xpack.security.sameSiteCookies`
206
+
| `xpack.security.sameSiteCookies` {ess-icon}
207
207
| Sets the `SameSite` attribute of the session cookie. This allows you to declare whether your cookie should be restricted to a first-party or same-site context.
208
208
Valid values are `Strict`, `Lax`, `None`.
209
209
This is *not set* by default, which modern browsers will treat as `Lax`. If you use Kibana embedded in an iframe in modern browsers, you might need to set it to `None`. Setting this value to `None` requires cookies to be sent over a secure connection by setting `xpack.security.secureCookies: true`. Some old versions of IE11 do not support `SameSite: None`.
210
210
211
-
| `xpack.security.session.idleTimeout`
211
+
| `xpack.security.session.idleTimeout` {ess-icon}
212
212
| Ensures that user sessions will expire after a period of inactivity. This and `xpack.security.session.lifespan` are both
213
213
highly recommended. By default, this setting is not set.
214
214
@@ -218,7 +218,7 @@ highly recommended. By default, this setting is not set.
218
218
The format is a string of `<count>[ms\|s\|m\|h\|d\|w\|M\|Y]` (e.g. '20m', '24h', '7d', '1w').
219
219
============
220
220
221
-
| `xpack.security.session.lifespan`
221
+
| `xpack.security.session.lifespan` {ess-icon}
222
222
| Ensures that user sessions will expire after the defined time period. This behavior also known as an "absolute timeout". If
223
223
this is _not_ set, user sessions could stay active indefinitely. This and `xpack.security.session.idleTimeout` are both highly
0 commit comments