I would like to enable authentication and authorization with LDAP and for this purpose I am following
I edited the config.yml file similarly as described there with my own credentials and with giving the path to another ca file as used in the nodes. Then I updated Opensearch by running securityadmin.sh. My hostname at config: hosts: has the form
config:
hosts:
- ldaps://example.de:636
I get a java.lang.NumberFormatException with this host. I also tried some variations and other variations give other errors, for example
config:
hosts:
- ldaps.example.de:636
throws an UnknownHostException and
config:
hosts:
- test.de:636
does not throw any error at all.
So my question would be what is wrong with the string as written in that format?
Are you intending to use LDAPS - i.e. secure connection between the OpenSearch nodes and the AD server ? If so, please make sure you’re configuring the proper values for TLS.
Enabling TLS:
Using the proper CA cert (this would be the certificate of the CA that signed your AD server’s cert)
Now I have the following problem when I am trying to log in with my ldap credentials
[WARN ][o.o.s.a.BackendRegistry ] [node1] Authentication finally failed for Test from myhost:myport
[INFO ][o.o.a.t.RCFResultTransportAction] [node1] Serve rcf request for xxxx-someID-xxxx
The WARN comes when I try to login with a non-existing user named “Test” and the INFO with [o.o.a.t.RCFResultTransportAction] comes when I try to login with my real credentials. From this I conclude that this is somehow working but not quit.
Does anyone know what this message means?
@Mussorgsky and @pablo Thank you very much for your respond.
I think the authentication works. I think the problem is that I don’t have permissions for the LDAP Users. For this I have to do a role mapping. I created a read-only role in Dashboards and an ldap-read-only user. When I go to the read-only role I have the column “Mapped user” where I have mapped my ldap-read-only-user.
Now, how does exactly the mapping to the LDAP server work? Do I have to write the bind_dn of the LDAP server into the backend role section? Is this enough?