Hi,
I am trying to setup SSO via OIDC using the opensearch security plugin. My config.yml seems to be correct. I have tried setting the order for openId to be the preferred way of authentication (0) but it continues to bypass this order and go straight to basic auth. I have provided my configs below (minus important details heh).
Config.yml
_meta:
type: "config"
config_version: 2
config:
dynamic:
http:
anonymous_auth_enabled: true
authc:
basic_internal_auth_domain:
http_enabled: true
order: 1
http_authenticator:
type: "basic"
challenge: false
authentication_backend:
type: "internal"
openid_auth_domain:
http_enabled: true
order: 0
http_authenticator:
type: "openid"
challenge: false
config:
subject_key: "preferred_username"
roles_key: "roles"
openid_connect_url: "<connect url placeholder>"
authentication_backend:
type: "noop"
opensearch_dashboards.yml
opensearch.ssl.verificationMode: none
opensearch.username: username
opensearch.password: password
opensearch.requestHeadersWhitelist: ["Authorization", "security_tenant", "securitytenant"]
server.ssl.enabled: false
opensearch_security.multitenancy.enabled: true
opensearch_security.multitenancy.tenants.enable_global: false
opensearch_security.multitenancy.tenants.enable_private: false
opensearch_security.multitenancy.tenants.preferred: ...<Tenant_Name>
opensearch_security.multitenancy.enable_filter: false
opensearch_security.readonly_mode.roles: ["kibana_read_only"]
plugins.security.auth.type: "openid"
plugins.security.openid.header: Authorization
plugins.security.openid.base_redirect_url: ...<redirect_url>
Not sure what else to check. With our 7.10.2 Opendistro cluster everything works just fine. Due to log4j our org is forcing the move to Opensearch. Any input would be greatly appreciated.
Thanks.