elastic / elasticsearch

Free and Open Source, Distributed, RESTful Search Engine
https://www.elastic.co/products/elasticsearch
Other
69.71k stars 24.67k forks source link

Allow OIDC usage over http #88541

Open knechtionscoding opened 2 years ago

knechtionscoding commented 2 years ago

Description

Background

Elasticsearch requires TLS connections in order to enable some security feature like Tokens for OIDC. This is important to guarantee that sensitive information is properly protected.

However, there are scenarios where encryption is managed outside of Elasticsearch. Notable examples are service mesh or reverse proxy software that are in front of the cluster, handling all incoming communication with the REST endpoint.

Description

Goal

Allow service mesh and reverse proxy environments to use Elasticsearch OIDC/Tokens in scenarios where a clear-text connection between the service and Elasticsearch is used.

Proposal

Allow to relax the TLS bootstrap checks to make OIDC/Tokens available when TLS is not enabled.

Other background Discussion:

https://github.com/dexidp/dex/issues/1593

https://github.com/elastic/elasticsearch/issues/61458

elasticsearchmachine commented 2 years ago

Pinging @elastic/es-security (Team:Security)

ywangd commented 2 years ago

This is a duplicate of https://github.com/elastic/elasticsearch/issues/81817. But I am going to close #81817 since this issue here is just for OAuth2 tokens while the other one has a mix of tokens and API keys and API keys no longer have the TLS restriction.

danielabbatt commented 11 months ago

Yes this would be very useful - I can't currently use Entra via OpenId Connect where the cluster is in kubernetes behind an haproxy which is TLS terminated. The pods inside the cluster are running just http so we don't have to deal with assigning certs for termination.

tomas-pritrsky commented 9 months ago

This is an issue.

landerz123 commented 9 months ago

Is there any progress on that? @elasticsearchmachine