IMPORTANT: No additional bug fixes or documentation updates
will be released for this version. For the latest information, see the
current release documentation.
Configuring single sign-on to the Elastic Stack using OpenID Connect
editConfiguring single sign-on to the Elastic Stack using OpenID Connect
editThe Elastic Stack supports single sign-on (SSO) using OpenID Connect via Kibana using Elasticsearch as the backend service that holds most of the functionality. Kibana and Elasticsearch together represent an OpenID Connect Relying Party (RP) that supports the Authorization Code Flow as this is defined in the OpenID Connect specification.
This guide assumes that you have an OpenID Connect Provider where the Elastic Stack Relying Party will be registered.
The OpenID Connect realm support in Kibana is designed with the expectation that it will be the primary authentication method for the users of that Kibana instance. The Configuring Kibana section describes what this entails and how you can set it up to support other realms if necessary.