Hi,
we have a 5 node elasticsearch cluster running 5.2.0,
2 of the nodes are configured as client nodes (data=false, master=false),
we configured the two client nodes to work with the ReadOnlyRest plugin and enabled the ldap authentication
for some reason we cannot authenticate with ldap.
this is our elasticsearch.yml:
readonlyrest:
enable: true
response_if_req_forbidden: Forbidden by ReadonlyREST ES plugin
access_control_rules:
- name: kibana
type: allow
auth_key: kibana:kibanapass
indices: [".kibana"]
- name: b1
type: allow
ldap_auth:
- name: "ldap"
groups: ["group1"]
indices: ["*"]
- name: b2
type: allow
ldap_auth:
- name: "ldap"
groups: ["group2"]
indices: ["*"]
ldaps:
- name: ldap
host: "xxxx.xxxxxxx.com"
port: 389
ssl_enabled: false
ssl_trust_all_certs: false
bind_dn: "cn=appUser,ou=someOU,dc=dcName,dc=com"
bind_password: "xxxxx"
search_user_base_DN: "dc=dcName,dc=com"
search_groups_base_DN: "dc=dcName,dc=com"
connection_pool_size: 10
connection_timeout_in_sec: 10
request_timeout_in_sec: 10
cache_ttl_in_sec: 60
we enabled the access logs and failed entries look like:
[2017-04-04T14:28:06,439][INFO ][org.elasticsearch.plugin.readonlyrest.acl.ACL] ^[[31m no block has matched, forbidding by default: { ID:7c6850045f7bxxxxbdd110bxxxxf6f9b, TYP:SearchRequest, USR:dcName/someUserName, BRS:false, ACT:indices:data/read/search, OA:xxx.xx.xxx.xx, IDX:.kibana, MET:POST, PTH:/.kibana/index-pattern/_search, CNT:<OMITTED, LENGTH=39>, HDR:authorization,content-length,x-forwarded-proto,Connection,x-forwarded-port,content-type,Host,x-forwarded-for, EFF:0, HIS:[kibana->[indices->true, auth_key->false]], [b1->[ldap_auth->false]], [b2->[ldap_auth->false]], [b1->[indices->true]], [b2->[indices->true]] }^[[0m
the user “someUserName” is part of the group “group1”
P.S
Our LDAP is microsoft active directory 2008R2