// Jest Snapshot v1, https://goo.gl/fbAQLP exports[`Get started (landing page) renders when backend configuration is disabled 1`] = `

Get started

The OpenSearch security plugin lets you define the API calls that users can make and the data they can access. The most basic configuration consists of these steps.

Roles are reusable collections of permissions. The default roles are a great starting point, but you might need to create custom roles that meet your exact needs. Explore existing roles Create new role , "title": "Create roles", }, Object { "children": After a user successfully authenticates, the security plugin retrieves that user’s roles. You can map roles directly to users, but you can also map them to backend roles. Map users to a role Create internal user , "title": "Map users", }, ] } />

Optional: Configure audit logs

Review Audit Log Configuration

Optional: Purge cache

By default, the security plugin caches authenticated users, along with their roles and permissions. This option will purge cached users, roles and permissions.

Purge cache

Optional: Multi-tenancy

By default tenancy is activated in Dashboards. Tenants in OpenSearch Dashboards are spaces for saving index patterns, visualizations, dashboards, and other OpenSearch Dashboards objects.

Manage Multi-tenancy Configure Multi-tenancy
`; exports[`Get started (landing page) renders when backend configuration is enabled 1`] = `

Get started

The OpenSearch security plugin lets you define the API calls that users can make and the data they can access. The most basic configuration consists of these steps.

Add authentication (authc) and authorization (authz) information to config/opensearch-security/config.yml . The authc section contains the backends to check user credentials against. The authz section contains any backends to fetch backend roles from. The most common example of a backend role is an LDAP group. Review authentication and authorization , "title": "Add backends", }, Object { "children": Roles are reusable collections of permissions. The default roles are a great starting point, but you might need to create custom roles that meet your exact needs. Explore existing roles Create new role , "title": "Create roles", }, Object { "children": After a user successfully authenticates, the security plugin retrieves that user’s roles. You can map roles directly to users, but you can also map them to backend roles. Map users to a role Create internal user , "title": "Map users", }, ] } />

Optional: Configure audit logs

Review Audit Log Configuration

Optional: Purge cache

By default, the security plugin caches authenticated users, along with their roles and permissions. This option will purge cached users, roles and permissions.

Purge cache

Optional: Multi-tenancy

By default tenancy is activated in Dashboards. Tenants in OpenSearch Dashboards are spaces for saving index patterns, visualizations, dashboards, and other OpenSearch Dashboards objects.

Manage Multi-tenancy Configure Multi-tenancy
`;