My Elasticsearch Security plugin seems to be working properly. It only allows users from my external LDAP, or my defined Admin, and it does proper password authorization.
The issue is with my Kibana Opendistro setup. I can type any username and password and it will always logs me in as the credentials saved in my elasticsearch.yml file under
opendistro_security.authcz.admin_dn
Has anyone ran into this issue before? Is this caused by some mismatch in my configuration files?
I need some help in configuring LDAP Authentication for Kibana UI as I am not able to.
Currently, I am login using internal user database on kibana UI.
NOTE:
I have setup LDAP authentication for Opendistro ElasticSearch.
I have setup the same for Logstash.
Problem is unable to login via ldap user credential.
Configuration are as followed.
KIBANA CONF:
cat kibana.yml
Copyright <2019> Amazon.com, Inc. or its affiliates. All Rights Reserved.
#######
####### Licensed under the Apache License, Version 2.0 (the “License”).
####### You may not use this file except in compliance with the License.
####### A copy of the License is located at
#######
####### http://www.apache.org/licenses/LICENSE-2.0
####### or in the “license” file accompanying this file. This file is distributed
####### on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
####### express or implied. See the License for the specific language governing
####### permissions and limitations under the License.
####### Release Note:
####### Default Kibana configuration for Open Distro.
####### Kibana is served by a back end server. This setting specifies the port to use.
server.port: 5601
####### Specifies the address to which the Kibana server will bind. IP addresses and host names are both valid values.
####### The default is ‘localhost’, which usually means remote machines will not be able to connect.
####### To allow connections from remote users, set this parameter to a non-loopback address.
server.host: exped02.ser01-dc.com
####### Enables SSL and paths to the PEM-format SSL certificate and SSL key files, respectively.
####### These settings enable SSL for outgoing requests from the Kibana server to the browser.
server.ssl.enabled: true
server.ssl.certificate: /etc/kibana/kibana.crt
server.ssl.key: /etc/kibana/kibana.key
#######server.ssl.redirectHttpFromPort: 5602
I see a couple of small differences between your kibana.yml and mine, but I doubt it’s the cause of the issue.
You have elasticsearch.ssl.verificationMode: full
Vs. I have elasticsearch.ssl.verificationMode: none
and you’re missing opendistro_security.auth.type: "basicauth"
It seems likely/possible that your issue exists either in your elasticsearch.yml or your config.yml files.
In elasticsearch.yml do you have configs for both opendistro_security.authcz.admin_dn:
and opendistro_security.nodes_dn:
?
In config.yml have you setup your kibana: settings?
Finally, when you try to login through Kibana do you see a specific error/unexpected functionality?
You said that LDAP login is working when you directly access the Elasticsearch cluster so I’ll assume that your LDAP configs are correct.
Hi @misiakj, I faced similar problem and tried your solution(login with different credentials from external IdP leads to login as kibana user) and it didn’t work for me. Can you look at my configs and find what’s wrong?
config.yml:
Hi @Kilbirdih,
One thing I noted that exchange_key is too short, it should be even number and at least 32 characters long. However, I would also like to see configuration, since my SAML config is still not working.