原英文版地址: https://www.elastic.co/guide/en/elasticsearch/reference/7.7/get-started-verify-users.html, 原文档版权归 www.elastic.co 所有
本地英文版地址: ../en/get-started-verify-users.html
本地英文版地址: ../en/get-started-verify-users.html
重要: 此版本不会发布额外的bug修复或文档更新。最新信息请参考 当前版本文档。
View system metrics in Kibanaedit
Log in to Kibana with the user ID that has metricbeat_reader
and kibana_user
roles (for example, jdoe
).
These roles enable the user to see the system metrics in Kibana (for example, on the Discover page or in the Metricbeat system overview dashboard).
What’s next?edit
Congratulations! You’ve successfully set up authentication and authorization by using the native realm. You learned how to create user IDs and roles that prevent unauthorized access to the Elastic Stack.
Later, when you’re ready to increase the number of nodes in your cluster, you’ll want to encrypt communications across the Elastic Stack. To learn how, read Encrypting communications.
For more detailed information about securing the Elastic Stack, see:
- Configuring security in Elasticsearch. Encrypt inter-node communications, set passwords for the built-in users, and manage your users and roles.
- Configuring security in Kibana. Set the authentication credentials in Kibana and encrypt communications between the browser and the Kibana server.
- Configuring security in Logstash. Set the authentication credentials for Logstash and encrypt communications between Logstash and Elasticsearch.
- Configuring security in the Beats. Configure authentication credentials and encrypt connections to Elasticsearch. For example, see Configure Filebeat to use security features.
- Configuring Elasticsearch for Apache Hadoop to use secured transport.