Yes, opensearch-security plugin is working properly now! I’m able to login into web-console using internal users. Thank you!
Now I’m trying to setup securityDashboards plugin for opensearch-dashboards (it was working before admin password changed and cluster mode enabled).
`opensearch@opensearch:/opt/opensearch-dashboards$ ./bin/opensearch-dashboards-plugin install securityDashboards`
`Found previous install attempt. Deleting…`
`Attempting to transfer from securityDashboards`
``` Attempting to transfer from ``https://ci.opensearch.org/ci/dbc/distribution-build-opensearch-dashboards/2.10.0/latest/linux/x64/tar/builds/opensearch-dashboards/plugins/securityDashboards-2.10.0.zip ```
`Transferring 1067294 bytes…`
`Transfer complete`
`Retrieving metadata from plugin archive`
`Extracting plugin archive`
`Extraction complete`
`Plugin installation complete`
But I’m not able to login using my own username which created through security dashboards =|
My opensearch_dashboards.yml
opensearch.hosts: \[http://localhost:9200\]
opensearch.ssl.verificationMode: none
opensearch.username: admin
opensearch.password: b6\*\*\*\*\*\*x1
opensearch.requestHeadersWhitelist: \[authorization, securitytenant\]
opensearch_security.multitenancy.enabled: true
opensearch_security.multitenancy.tenants.preferred: \[Global, Private\]
opensearch_security.readonly_mode.roles: \[kibana_read_only\]
opensearch_security.cookie.secure: false**
**
b6\*\*\*\*\*\*x1 - is my new admin opensearch password.**
**
My opensearch.yml
cluster.name: opensearch
cluster.initial_master_nodes: [“opensearch-node1”\
node.name: opensearch-node1
node.roles: [master, data]
#node.attr.rack: r1
path.data: /opt/opensearch/data
path.logs: /opt/opensearch/logs
#bootstrap.memory_lock: true
network.host: 0.0.0.0
http.port: 9200
discovery.seed_hosts: [“172.16.1.7”]
#cluster.initial_cluster_manager_nodes: [“node-1”, “node-2”]
#gateway.recover_after_nodes: 3
#action.destructive_requires_name: true
######## Start OpenSearch Security Demo Configuration ########
plugins.security.disabled: false
plugins.security.ssl.transport.pemcert_filepath: node1.pem
plugins.security.ssl.transport.pemkey_filepath: node1-key.pem
plugins.security.ssl.transport.pemtrustedcas_filepath: root-ca.pem
plugins.security.ssl.transport.enforce_hostname_verification: false
plugins.security.ssl.http.enabled: false
plugins.security.ssl.http.pemcert_filepath: node1.pem
plugins.security.ssl.http.pemkey_filepath: node1-key.pem
plugins.security.ssl.http.pemtrustedcas_filepath: root-ca.pem
plugins.security.allow_unsafe_democertificates: true
plugins.security.allow_default_init_securityindex: true
plugins.security.authcz.admin_dn:
- “emailAddress=bs-net@work.local,CN=opensearch,OU=IT,O=MyWork,L=City,ST=City,C=PL”
plugins.security.nodes_dn:
- “emailAddress=bs-net@work.local,CN=opensearch-node1,OU=IT,O=MyWork,L=City,ST=City,C=PL”
plugins.security.audit.type: internal_opensearch
plugins.security.enable_snapshot_restore_privilege: true
plugins.security.check_snapshot_restore_write_privileges: true
plugins.security.restapi.roles_enabled:
[“all_access”, “security_rest_api_access”]
plugins.security.system_indices.enabled: true
plugins.security.system_indices.indices:
[
“.plugins-ml-model”,
“.plugins-ml-task”,
“.opendistro-alerting-config”,
“.opendistro-alerting-alert*”,
“.opendistro-anomaly-results*”,
“.opendistro-anomaly-detector*”,
“.opendistro-anomaly-checkpoints”,
“.opendistro-anomaly-detection-state”,
“.opendistro-reports-*",
".opensearch-notifications-*”,
“.opensearch-notebooks”,
“.opensearch-observability”,
“.opendistro-asynchronous-search-response*”,
“.replication-metadata-store”,
]
node.max_local_storage_nodes: 3
######## End OpenSearch Security Demo Configuration ########