.kibana-* index name

Versions (relevant - OpenSearch/Dashboard/Server OS/Browser):
OpenSeach: 2.15
OS: Ubuntu 22.04
Dashboards: 2.15

Describe the issue:
I have LDAP authc/authz integration
when a new user logs in - an index is created without a username

green  open   .kibana_-546043993__1            OTQ35L0GTmyiyOH379LneA   1   1          1            0     10.3kb          5.1kb

authc:

      ldaps:
        description: "Authenticate via LDAP or Active Directory"
        http_enabled: true
        transport_enabled: false
        order: 5
        http_authenticator:
          type: basic
          challenge: false
        authentication_backend:
          # LDAP authentication backend (authenticate users against a LDAP or Active Directory)
          type: ldap
          config:
            # enable ldaps
            enable_ssl: true
            # enable start tls, enable_ssl should be false
            enable_start_tls: false
            # send client certificate
            enable_ssl_client_auth: false
            # verify ldap hostname
            verify_hostnames: true
            pemtrustedcas_filepath: /etc/opensearch/cert.pem
            hosts:
              - dc.domain.local:636
            bind_dn: 'CN=ldap_opensearch_dev,OU=Dev,OU=OpenSearch,DC=domain,DC=local'
            password: 'PASSWORD'
            userbase: 'DC=domain,DC=local'
            # Filter to search for users (currently in the whole subtree beneath userbase)
            # {0} is substituted with the username
            usersearch: '(sAMAccountName={0})'
            # Use this attribute from the user as username (if not set then DN is used)
            username_attribute: cn

authz:

          config:
            # enable ldaps
            enable_ssl: true
            # enable start tls, enable_ssl should be false
            enable_start_tls: false
            # send client certificate
            enable_ssl_client_auth: false
            # verify ldap hostname
            verify_hostnames: true
            pemtrustedcas_filepath: /etc/opensearch/cert.pem
            hosts:
              - dc.domain.local:636
            bind_dn: 'CN=ldap_opensearch_dev,OU=Dev,OU=OpenSearch,DC=domain,DC=local'
            password: 'PASSWORD'
            rolebase: 'OU=OpenSearch,OU=Special accounts,DC=domain,DC=local'
            # Filter to search for roles (currently in the whole subtree beneath rolebase)
            # {0} is substituted with the DN of the user
            # {1} is substituted with the username
            # {2} is substituted with an attribute value from user's directory entry, of the authenticated user. Use userroleattribute>
            rolesearch: '(member={0})'
            # Specify the name of the attribute which value should be substituted with {2} above
            userroleattribute: null
            # Roles as an attribute of the user entry
            userrolename: 'memberOf'
            #userrolename: memberOf
            # The attribute in a role entry containing the name of that role, Default is "name".
            # Can also be "dn" to use the full DN as rolename.
            rolename: cn
            # Resolve nested roles transitive (roles which are members of other roles and so on ...)
            resolve_nested_roles: true
            userbase: 'DC=domain,DC=local'
            # Filter to search for users (currently in the whole subtree beneath userbase)
            # {0} is substituted with the username
            usersearch: '(uid={0})'
            username_attribute: 'cn'

Are there any ways to fix it?

Fixed

On authc config need to set:

username_attribute: 'sAMAccountName'
1 Like

This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.