Versions (relevant - OpenSearch/Dashboard/Server OS/Browser): 3.1
Describe the issue:
I’m working on an OpenSearch setup where I want to allow anonymous users to access the system without any authentication. Specifically, I want these users to have full access — including admin-level permissions and access to system indices like .opendistro_security
.
Despite configuring anonymous access, I keep encountering the following error:
{"error":{"root_cause":[{"type":"security_exception","reason":"no permissions for [] and User [name=opendistro_security_anonymous, backend_roles=[opendistro_security_anonymous_backendrole], requestedTenant=null]"}],"type":"security_exception","reason":"no permissions for [] and User [name=opendistro_security_anonymous, backend_roles=[opendistro_security_anonymous_backendrole], requestedTenant=null]"},"status":403}.
Configuration:
I am sharing below the configurations that I am using. But it is still giving me the same error - security_exception.
config/opensearch-security/roles_mapping.yml file
all_access:
reserved: false
backend_roles:
- "admin"
- "opendistro_security_anonymous_backendrole"
config/opensearch.yml file
plugins.security.nodes_dn: ...
plugins.security.allow_default_init_securityindex: true
plugins.security.ssl.transport.enforce_hostname_verification: false
plugins.security.ssl.certificates_hot_reload.enabled: true
plugins.security.system_indices.permission.enabled: true
plugins.security.system_indices.enabled: true
plugins.security.restapi.admin.enabled: true
plugins.security.restapi.roles_enabled: ["all_access", "security_rest_api_access", "anonymous_users_role"]
# plugins.security.cache.ttl_minutes: 1
plugins.security.ssl.http.enabled: false
plugins.security.ssl.transport.enabled: true
plugins.security.ssl.transport.keystore_type: pkcs12
plugins.security.ssl.transport.keystore_filepath: keystore.pfx
plugins.security.ssl.transport.truststore_type: pkcs12
plugins.security.ssl.transport.truststore_filepath: truststore.pfx
plugins.security.ssl.transport.enabled_ciphers: ...
plugins.security.ssl.transport.enabled_protocols: ...
Relevant Logs or Screenshots
{"error":{"root_cause":[{"type":"security_exception","reason":"no permissions for [] and User [name=opendistro_security_anonymous, backend_roles=[opendistro_security_anonymous_backendrole], requestedTenant=null]"}],"type":"security_exception","reason":"no permissions for [] and User [name=opendistro_security_anonymous, backend_roles=[opendistro_security_anonymous_backendrole], requestedTenant=null]"},"status":403}.