Please advice how can I connect with Keycloak Server which use Self Sign Certificate, Thank you.
Detail about my configuration
OpenSearch Server 1.2.4
OpenSearch Dashboards 1.2.0
Config to authenticate with Keycloak.
In my config.yml
_meta:
type: "config"
config_version: 2
config:
dynamic:
http:
anonymous_auth_enabled: false
xff:
enabled: false
internalProxies: '192\.168\.0\.10|192\.168\.0\.11' # regex pattern
authc:
basic_internal_auth_domain:
description: "Authenticate via HTTP Basic against internal users database"
http_enabled: true
transport_enabled: true
order: 1
http_authenticator:
type: basic
challenge: true
authentication_backend:
type: intern
openid_auth_domain:
http_enabled: true
transport_enabled: true
order: 0
http_authenticator:
type: openid
challenge: false
config:
openid_connect_url: https://192.168.10.25/auth/realms/guru/.well-known/openid-configuration
openid_connect_idp.pemtrustedcas_filepath: /usr/share/opensearch/config/cert-gr-team-local.cer
openid_connect_idp.enable_ssl: true
subject_key: preferred_username
roles_key: roles
authentication_backend:
type: noop
authz:
roles_from_myldap:
description: "Authorize via LDAP or Active Directory"
http_enabled: false
transport_enabled: false
authorization_backend:
type: ldap
In my opensearch_dashboards.yml
server.host: "192.168.10.40"
opensearch.hosts: ["http://localhost:9200"]
opensearch.ssl.verificationMode: none
opensearch.username: "kibanaserver"
opensearch.password: "kibanaserver"
opensearch.requestHeadersWhitelist: [ authorization,securitytenant ]
opensearch_security.multitenancy.enabled: true
opensearch_security.multitenancy.tenants.preferred: ["Private", "Global"]
opensearch_security.readonly_mode.roles: ["kibana_read_only"]
# Use this setting if you are running opensearch-dashboards without https
opensearch_security.cookie.secure: false
# Enable OpenID authentication
opensearch_security.auth.type: "openid"
# The IdP metadata endpoint
opensearch_security.openid.connect_url: "https://192.168.10.25/auth/realms/guru/.well-known/openid-configuration"
opensearch_security.openid.root_ca: "/usr/share/opensearch-dashboards/config/cert-gr-team-local.cer"
opensearch_security.openid.verify_hostnames: false
# The ID of the OpenID Connect client in your IdP
opensearch_security.openid.client_id: "opensearch-client"
# The client secret of the OpenID Connect client
opensearch_security.openid.client_secret: "e2adde37-ef44-4167-af37-c740c2034dd5"
When I run OpenSearch via docker-compose command. It show error log like this.