Versions (relevant - OpenSearch/Dashboard/Server OS/Browser):
Our version of Opensearch and Opensearch Dashboard : 2.4.0, on Docker
It’s a single-node cluster with no SSL / TLS enabled
Describe the issue:
We’re trying to set up OIDC (OpenID Connect) on Opensearch but we still have the following error :
@vincent2mots In your config.yml file you’ve set openid_auth_domain.http_authenticator.config.enable_ssl to false. However, openid_auth_domain.http_authenticator.config.openid_connect_url contains HTTPS.
You must set enable_ssl to true to secure connection to the OpenID IdP.
If your IdP uses self-signed certificates, you must provide the RootCA or IdP certificate in the config.yml and opensearch_dashboards.yml.
@vincent2mots Correct, non of the authentication domains in config.yml has such an option.
You always must provide TLS certificate when your IDP is using a self-signed certificate and communication is secured.
I got the certificate (using a web browser) and tried to add it into the config files but I sill have the same issue.
The certificate can be in PEM or CER format I suppose?
Could it be related to the fact the certificate seems to be unsecured? In my web browser, while accessing to the URL, I have a message (next to the URL) saying the connection is insecured.
Hello there.
While I still not able to resolve my own case, I successfully fixed your error by adding ca cert to java’s cacert keystore, with keytool.
Not sure it’s a good way though.