Hi OS/D community.
We have been using the /_dashboards/api/saved_objects/_import
url to manage our saved objects via a bash script.
We have an internal user database configured with a ‘master’ user who has the ‘all_access’ role assigned.
We would authenticate with the /_dashboards/auth/login
url, sending the user and password, then saving the cookies to authenticate the saved objects POST.
We’ve recently enabled SAML and have noticed that the /_dashboards/auth/login
url now returns a 404.
How can we use this internal user authentication method as well as using SAML?
Have posted our securityconfig response with identifying details removed
We’re using the AWS OpenSearch Service if that is relevant (most security config managed by aws)
{
"config": {
"dynamic": {
"filtered_alias_mode": "warn",
"disable_rest_auth": false,
"disable_intertransport_auth": false,
"respect_request_indices_options": false,
"kibana": {
"multitenancy_enabled": true,
"server_username": "AmazonESKibanaServerUser",
"index": ".kibana"
},
"http": {
"anonymous_auth_enabled": false,
"xff": {
"enabled": false,
"internalProxies": "ip-address-list",
"remoteIpHeader": "X-Forwarded-For"
}
},
"authc": {
"basic_internal_auth_domain": {
"http_enabled": true,
"transport_enabled": true,
"order": 4,
"http_authenticator": {
"challenge": false,
"type": "basic",
"config": {}
},
"authentication_backend": {
"type": "intern",
"config": {}
},
"description": "Authenticate via HTTP Basic against internal users database"
},
"saml_auth_domain": {
"http_enabled": true,
"transport_enabled": false,
"order": 5,
"http_authenticator": {
"challenge": true,
"type": "saml",
"config": {
"redacted": "true"
}
},
"authentication_backend": {
"type": "noop",
"config": {}
}
}
},
"authz": {},
"auth_failure_listeners": {},
"do_not_fail_on_forbidden": false,
"multi_rolespan_enabled": true,
"hosts_resolver_mode": "ip-only",
"do_not_fail_on_forbidden_empty": false
}
}
}