I have the following configuration in ‘config.yml’:
_meta:
type: "config"
config_version: 2
config:
dynamic:
authc:
basic_internal_auth_domain:
description: "Authenticate via HTTP Basic against internal users database"
http_enabled: false
transport_enabled: false
order: 0
http_authenticator:
type: basic
challenge: true
authentication_backend:
type: intern
ldap:
description: "Authenticate via Active Directory"
http_enabled: true
# transport_enabled: true
order: 1
http_authenticator:
type: basic
challenge: true
authentication_backend:
# LDAP authentication backend (authenticate users against a LDAP or Active Directory)
type: ldap
config:
# enable ldaps
enable_ssl: false
# enable start tls, enable_ssl should be false
enable_start_tls: false
# send client certificate
enable_ssl_client_auth: false
# verify ldap hostname
verify_hostnames: false
hosts:
- dc.es:3268
bind_dn: CN=opensearch,OU=people,OU=cuentasservicio,DC=dc,DC=es
password: "******"
userbase: 'OU=people,OU=blabla,DC=dc,DC=es'
# Filter to search for users (currently in the whole subtree beneath userbase)
# {0} is substituted with the username
#usersearch: '(sAMAccountName=%s)'
usersearch: '(sAMAccountName=%s)'
# Use this attribute from the user as username (if not set then DN is used)
username_attribute: sAMAccountName
connect_timeout: 5000
response_timeout: 0
At the moment I want to configure internal authentication and ldap authentication, authorisation is set to internal by default.
I have checked with the ldapsearch tool that there is no problem with the domain controller, as the following command is executed correctly:
ldapsearch -x -b "dc=dc,dc=es" -h dc.es:3268 -D "CN=opensearch,OU=people,OU=cuentasservicio,DC=dc,DC=es" -W
However, the following lines keep appearing in the opensearch log (kibanaserver is an internal user):
[2022-02-07T23:01:52,090][TRACE][c.a.d.a.l.b.LDAPAuthorizationBackend] [opensearch-master-node] Connect to dc.es:3268
[2022-02-07T23:01:52,091][TRACE][c.a.d.a.l.b.LDAPAuthorizationBackend] [opensearch-master-node] Connect to ldap://dc.es:3268
[2022-02-07T23:01:52,091][DEBUG][c.a.d.a.l.b.LDAPAuthorizationBackend] [opensearch-master-node] Connect timeout: PT5S/ResponseTimeout: PT0S
[2022-02-07T23:01:52,092][DEBUG][c.a.d.a.l.b.LDAPAuthorizationBackend] [opensearch-master-node] bindDn CN=opensearch,OU=people,OU=cuentasservicio,DC=dc,DC=es, password ****
[2022-02-07T23:01:52,092][DEBUG][c.a.d.a.l.b.LDAPAuthorizationBackend] [opensearch-master-node] Will perform simple bind with bind dn
[2022-02-07T23:01:52,151][DEBUG][c.a.d.a.l.b.LDAPAuthorizationBackend] [opensearch-master-node] Opened a connection, total count is now 1
[2022-02-07T23:01:52,154][DEBUG][c.a.d.a.l.b.LDAPAuthorizationBackend] [opensearch-master-node] Closed a connection, total count is now 0
[2022-02-07T23:01:52,156][WARN ][o.o.s.a.BackendRegistry ] [opensearch-master-node] Authentication finally failed for kibanaserver from 127.0.0.1:37372
Is there any way to find out more about the problem, what it might be?