Hey @Mr_Hedgehog
kind of confusing, your using SAML but error shows Basic Authorization.
I also have multiple logon s config. using keycloak. I did Basic order[0]. SAML order[1], and left ldap order [5]
authc:
saml_auth_domain:
http_enabled: true
transport_enabled: true
order: 1
http_authenticator:
type: saml
challenge: true
config:
idp:
metadata_file: /etc/opensearch/keycloak.xml
entity_id: https://keycloak.domain.com:8443/realms/opensearch
sp:
entity_id: https://opensearch.domain.com:5601
kibana_url: https://opensearch.domain.com:5601
roles_key: Role
exchange_key: 7LsWZ9B4D_m3TVWHNAsIVF1odcmXOu8VaI4xdfhInMk
authentication_backend:
type: noop
basic_internal_auth_domain:
description: "Authenticate via HTTP Basic against internal users database"
http_enabled: true
transport_enabled: true
order: 0
http_authenticator:
type: basic
challenge: false
authentication_backend:
type: intern
ldap:
description: "Authenticate via LDAP or Active Directory"
http_enabled: false
transport_enabled: false
order: 5
Dont forget to execute ./securityadmin.sh everytime adjustments are made to config.yml file