Yes, you right. There are a config, for some reason I get an empty in case if I use PowerShell. Using curl gives an expected configuration file.
{
"config" : {
"dynamic" : {
"filtered_alias_mode" : "warn",
"disable_rest_auth" : false,
"disable_intertransport_auth" : false,
"respect_request_indices_options" : false,
"kibana" : {
"multitenancy_enabled" : true,
"private_tenant_enabled" : true,
"default_tenant" : "",
"server_username" : "kibanaserver",
"index" : ".kibana"
},
"http" : {
"anonymous_auth_enabled" : false,
"xff" : {
"enabled" : false,
"internalProxies" : "192\\.168\\.0\\.10|192\\.168\\.0\\.11",
"remoteIpHeader" : "x-forwarded-for"
}
},
"authc" : {
"openid_auth_domain" : {
"http_enabled" : true,
"transport_enabled" : true,
"order" : 2,
"http_authenticator" : {
"challenge" : false,
"type" : "openid",
"config" : {
"openid_connect_idp" : {
"enable_ssl" : true,
"pemtrustedcas_filepath" : "/usr/share/opensearch/config/root-ca.pem",
"verify_hostnames" : false,
"subject_key" : "email",
"roles_key" : "roles",
"openid_connect_url" : "https://login.microsoftonline.com/<tenantid>/v2.0/.well-known/openid-configuration"
}
}
},
"authentication_backend" : {
"type" : "noop",
"config" : { }
}
},
"basic_internal_auth_domain" : {
"http_enabled" : true,
"transport_enabled" : true,
"order" : 1,
"http_authenticator" : {
"challenge" : true,
"type" : "basic",
"config" : { }
},
"authentication_backend" : {
"type" : "internal",
"config" : { }
},
"description" : "Authenticate via HTTP Basic against internal users database"
}
},
"authz" : { },
"auth_failure_listeners" : { },
"do_not_fail_on_forbidden" : false,
"multi_rolespan_enabled" : true,
"hosts_resolver_mode" : "ip-only",
"do_not_fail_on_forbidden_empty" : false
}
}
}