Hi guys , so lately i added the open distro security plugin to the ELK 7.4.0 distribution, so i’m trying rto connect to the ldap server but something is wrong,
My config file seem to be correct and why i login using kibana i get this message, it gives my session name so it connects to the ldap erver but i can’t access kibana
{"message":"no permissions for [indices:data/read/search] and User [name=USER_NAME, backend_roles=[], requestedTenant=null]: [security_exception] no permissions for [indices:data/read/search] and User [name=USER_NAMEI, backend_roles=[], requestedTenant=null]","statusCode":403,"error":"Forbidden"}
this is my config file:
ldap: description: "Authenticate via LDAP or Active Directory" http_enabled: true transport_enabled: false order: 1 http_authenticator: type: basic challenge: false authentication_backend: # LDAP authentication backend (authenticate users against a LDAP or Active Directory) type: ldap config: # enable ldaps enable_ssl: false # enable start tls, enable_ssl should be false enable_start_tls: false # send client certificate enable_ssl_client_auth: false # verify ldap hostname verify_hostnames: false hosts: - "....:389" bind_dn: 'cn=authreader,cn=Users,DC=****,DC=int' password: 'password' userbase: 'ou=*****,DC=****,DC=int' # Filter to search for users (currently in the whole subtree beneath userbase) # {0} is substituted with the username usersearch: '(sAMAccountName={0})' # Use this attribute from the user as username (if not set then DN is used) username_attribute: 'cn' authz: roles_from_myldap: description: "Authorize via LDAP or Active Directory" http_enabled: true transport_enabled: false authorization_backend: # LDAP authorization backend (gather roles from a LDAP or Active Directory, you have to configure the above LDAP authentication backend settings too) type: ldap config: # enable ldaps enable_ssl: true # enable start tls, enable_ssl should be false enable_start_tls: false # send client certificate enable_ssl_client_auth: false # verify ldap hostname verify_hostnames: true hosts: - "....:389" bind_dn: 'cn=authreader,cn=Users,DC=****,DC=int' password: 're@d123$' rolebase: 'ou=****,DC=****,DC=int' # Filter to search for roles (currently in the whole subtree beneath rolebase) # {0} is substituted with the DN of the user # {1} is substituted with the username # {2} is substituted with an attribute value from user's directory entry, of the authenticated user. Use userroleattribute to specify the name of the attribute rolesearch: '(member={0})' # Specify the name of the attribute which value should be substituted with {2} above userroleattribute: null # Roles as an attribute of the user entry #userrolename: disabled userrolename: memberOf # The attribute in a role entry containing the name of that role, Default is "name". # Can also be "dn" to use the full DN as rolename. rolename: 'cn' # Resolve nested roles transitive (roles which are members of other roles and so on ...) resolve_nested_roles: true userbase: 'ou=****,DC=biat,DC=int' # Filter to search for users (currently in the whole subtree beneath userbase) # {0} is substituted with the username usersearch: '(uid={0})' # Skip users matching a user name, a wildcard or a regex pattern #skip_users: # - 'cn=Michael Jackson,ou*people,o=TEST' # - '/\S*/'
and this is my kibana.yml:
server.name: kibana elasticsearch.ssl.verificationMode: none elasticsearch.username: *** elasticsearch.password: **** #elasticsearch.requestHeadersWhitelist: ["securitytenant","Authorization"] opendistro_security.multitenancy.enabled: false opendistro_security.multitenancy.tenants.enable_global: false opendistro_security.multitenancy.tenants.enable_private: false
any idea what am i doing wrong ?? thanks for your help.