Hi OS/D community.
We have been using the /_dashboards/api/saved_objects/_import url to manage our saved objects via a bash script.
We have an internal user database configured with a ‘master’ user who has the ‘all_access’ role assigned.
We would authenticate with the /_dashboards/auth/login url, sending the user and password, then saving the cookies to authenticate the saved objects POST.
We’ve recently enabled SAML and have noticed that the /_dashboards/auth/login url now returns a 404.
How can we use this internal user authentication method as well as using SAML?
Have posted our securityconfig response with identifying details removed ![]()
We’re using the AWS OpenSearch Service if that is relevant (most security config managed by aws)
{
"config": {
"dynamic": {
"filtered_alias_mode": "warn",
"disable_rest_auth": false,
"disable_intertransport_auth": false,
"respect_request_indices_options": false,
"kibana": {
"multitenancy_enabled": true,
"server_username": "AmazonESKibanaServerUser",
"index": ".kibana"
},
"http": {
"anonymous_auth_enabled": false,
"xff": {
"enabled": false,
"internalProxies": "ip-address-list",
"remoteIpHeader": "X-Forwarded-For"
}
},
"authc": {
"basic_internal_auth_domain": {
"http_enabled": true,
"transport_enabled": true,
"order": 4,
"http_authenticator": {
"challenge": false,
"type": "basic",
"config": {}
},
"authentication_backend": {
"type": "intern",
"config": {}
},
"description": "Authenticate via HTTP Basic against internal users database"
},
"saml_auth_domain": {
"http_enabled": true,
"transport_enabled": false,
"order": 5,
"http_authenticator": {
"challenge": true,
"type": "saml",
"config": {
"redacted": "true"
}
},
"authentication_backend": {
"type": "noop",
"config": {}
}
}
},
"authz": {},
"auth_failure_listeners": {},
"do_not_fail_on_forbidden": false,
"multi_rolespan_enabled": true,
"hosts_resolver_mode": "ip-only",
"do_not_fail_on_forbidden_empty": false
}
}
}