Versions (relevant - OpenSearch/Dashboard/Server OS/Browser):
opensearch: 2.7.0
Describe the issue:
I have configure and applied all the below config files but still getting unauthorized access even though I have mapped user with the backend role available in opensearch
Configuration:
opensearch_dashboard.yml
server:
name: dashboards
host: 0.0.0.0
# Dashboards TLS Config (Ensure the cert files are present before enabling SSL
ssl:
enabled: false
# key: /usr/share/opensearch-dashboards/certs/dashboards-key.pem
# certificate: /usr/share/opensearch-dashboards/certs/dashboards-crt.pem
# determines how dashboards will verify certificates (needs to be none for default opensearch certificates to work)
opensearch:
ssl:
verificationMode: certificate
certificateAuthorities: /usr/share/opensearch-dashboards/config/root-ca.pem
requestHeadersAllowlist:
- Authorization
- securitytenant
opensearch_security:
multitenancy:
enabled: true
tenants:
preferred:
- Private
- Global
cookie:
secure: false
auth:
multiple_auth_enabled: true
type:
- openid
- basicauth
openid:
connect_url: "https://login.microsoftonline.com/<tenant ID>/v2.0/.well-known/openid-configuration"
client_id: "<Client Id>"
client_secret: "<client Secret>"
base_redirect_url: "http://localhost:5601"
logging:
verbose: true
opensearch.yml
_meta:
type: "config"
config_version: 2
config:
dynamic:
http:
anonymous_auth_enabled: false
xff:
enabled: false
internalProxies: "192\\.168\\.0\\.10|192\\.168\\.0\\.11"
remoteIpHeader: "x-forwarded-for"
authc:
basic_internal_auth_domain:
description: "Authenticate via HTTP Basic against internal users database"
http_enabled: true
transport_enabled: true
order: 1
http_authenticator:
type: "basic"
challenge: false
authentication_backend:
type: "internal"
openid_auth_domain:
http_enabled: true
transport_enabled: true
order: 0
http_authenticator:
type: "openid"
challenge: false
config:
openid_connect_idp:
enable_ssl: true
verify_hostnames: false
subject_key: "email"
roles_key: "roles"
openid_connect_url: "https://login.microsoftonline.com/<tenantID>/v2.0/.well-known/openid-configuration"
authentication_backend:
type: "noop"
Relevant Logs or Screenshots:
APP Roles to map backend role admin
No relevant logs