Versions (relevant - OpenSearch/Dashboard/Server OS/Browser):
OpenSeach: 2.15
OS: Ubuntu 22.04
Dashboards: 2.15
Describe the issue:
I have LDAP authc/authz integration
when a new user logs in - an index is created without a username
green open .kibana_-546043993__1 OTQ35L0GTmyiyOH379LneA 1 1 1 0 10.3kb 5.1kb
authc:
ldaps:
description: "Authenticate via LDAP or Active Directory"
http_enabled: true
transport_enabled: false
order: 5
http_authenticator:
type: basic
challenge: false
authentication_backend:
# LDAP authentication backend (authenticate users against a LDAP or Active Directory)
type: ldap
config:
# enable ldaps
enable_ssl: true
# enable start tls, enable_ssl should be false
enable_start_tls: false
# send client certificate
enable_ssl_client_auth: false
# verify ldap hostname
verify_hostnames: true
pemtrustedcas_filepath: /etc/opensearch/cert.pem
hosts:
- dc.domain.local:636
bind_dn: 'CN=ldap_opensearch_dev,OU=Dev,OU=OpenSearch,DC=domain,DC=local'
password: 'PASSWORD'
userbase: 'DC=domain,DC=local'
# Filter to search for users (currently in the whole subtree beneath userbase)
# {0} is substituted with the username
usersearch: '(sAMAccountName={0})'
# Use this attribute from the user as username (if not set then DN is used)
username_attribute: cn
authz:
config:
# enable ldaps
enable_ssl: true
# enable start tls, enable_ssl should be false
enable_start_tls: false
# send client certificate
enable_ssl_client_auth: false
# verify ldap hostname
verify_hostnames: true
pemtrustedcas_filepath: /etc/opensearch/cert.pem
hosts:
- dc.domain.local:636
bind_dn: 'CN=ldap_opensearch_dev,OU=Dev,OU=OpenSearch,DC=domain,DC=local'
password: 'PASSWORD'
rolebase: 'OU=OpenSearch,OU=Special accounts,DC=domain,DC=local'
# Filter to search for roles (currently in the whole subtree beneath rolebase)
# {0} is substituted with the DN of the user
# {1} is substituted with the username
# {2} is substituted with an attribute value from user's directory entry, of the authenticated user. Use userroleattribute>
rolesearch: '(member={0})'
# Specify the name of the attribute which value should be substituted with {2} above
userroleattribute: null
# Roles as an attribute of the user entry
userrolename: 'memberOf'
#userrolename: memberOf
# The attribute in a role entry containing the name of that role, Default is "name".
# Can also be "dn" to use the full DN as rolename.
rolename: cn
# Resolve nested roles transitive (roles which are members of other roles and so on ...)
resolve_nested_roles: true
userbase: 'DC=domain,DC=local'
# Filter to search for users (currently in the whole subtree beneath userbase)
# {0} is substituted with the username
usersearch: '(uid={0})'
username_attribute: 'cn'
Are there any ways to fix it?