With LDAP config, ES start error

Test by basic user, is good

readonlyrest:
    access_control_rules:
    - name: "::ADMIN::"
      auth_key: admin:dev
      kibana_access: admin

    - name: "Require HTTP Basic Auth"
      type: allow
      auth_key: user:password
      indices: ["kibana_sample_data_ecommerce"]

    - name: "::KIBANA-SRV::"
      auth_key: kibana:kibana

Test ldap conf,start error,pls see following:

Error(Browse http://localhost:9200/)

{"error":{"root_cause":[{"reason":"ReadonlyREST failed to start"}],"reason":"ReadonlyREST failed to start","status":503}}

Error(Start Elasticsearch)

at monix.eval.internal.TaskRestartCallback.onSuccess(TaskRestartCallback.scala:74) [monix-eval_2.12-3.0.0.jar:3.0.0]
at monix.eval.internal.TaskSleep$SleepRunnable.run(TaskSleep.scala:66) [monix-eval_2.12-3.0.0.jar:3.0.0]
at java.util.concurrent.ForkJoinTask$RunnableExecuteAction.exec(ForkJoinTask.java:1429) [?:?]
at java.util.concurrent.ForkJoinTask.doExec(ForkJoinTask.java:290) [?:?]
at java.util.concurrent.ForkJoinPool$WorkQueue.topLevelExec(ForkJoinPool.java:1016) [?:?]
at java.util.concurrent.ForkJoinPool.scan(ForkJoinPool.java:1665) [?:?]
at java.util.concurrent.ForkJoinPool.runWorker(ForkJoinPool.java:1598) [?:?]
at java.util.concurrent.ForkJoinWorkerThread.run(ForkJoinWorkerThread.java:177) [?:?]

OS environment

Desktop: Windows 10

1. Elastinsearch 7.8.0
2. Kibana 7.8.0
3. readonlyrest-1.20.0_es7.8.0
4. readonlyrest_kbn_free-1.20.0_es7.8.0

AD Server: Windows 2008 R2

no ssl

elasticsearch.yml

# For X-Pack users: you may only leave monitoring on. 
# Don't add this if X-Pack is not installed at all
xpack.graph.enabled: false
xpack.ml.enabled: false
xpack.monitoring.enabled: true
xpack.security.enabled: false
xpack.watcher.enabled: false

readonlyrest.yml

readonlyrest:
    access_control_rules:

    - name: Accept requests from users in group team1 on index1
      type: allow
      ldap_authentication: "ldap1"
      ldap_authorization:
        name: "ldap1"
        groups: ["*"]
      indices: ["*"]

    ldaps:

    - name: ldap1
      host: "mydom.com"
      port: 389
      ssl_enabled: false
      ssl_trust_all_certs: true
      bind_dn: "CN=037189,OU=000025,OU=000001,OU=OU,DC=mydom,DC=com"
      bind_password: "mypasswd"
      search_user_base_DN: "OU=000001,OU=OU,DC=mydom,DC=com"
      user_id_attribute: "sAMAccountName"
      search_groups_base_DN: "OU=000001,OU=OU,DC=mydom,DC=com"

kibana.yml

# For X-Pack users: you may only leave monitoring on. 
# Don't add this if X-Pack is not installed at all
xpack.graph.enabled: false
xpack.ml.enabled: false
xpack.monitoring.enabled: true
xpack.security.enabled: false
xpack.watcher.enabled: false

# Kibana server use ::KIBANA-SRV:: credentials
elasticsearch.username: "kibana"
elasticsearch.password: "kibana"

Hi @fosss, thanks for reporting. The stack trace in the ES log looks incomplete, can you show us the whole thing with a few lines before and after?