I Think this will be easier to troubleshoot on the elasticsearch side than on the kibana side, as elasticsearch handles all the LDAP functionality.
-
Have you added
xpack.security.authc.realms.ldap.ldap1.secure_bind_passwordin the elasticsearch keystore ? -
Is the password correct? i.e. can you bind with
cn=binduser, ou=ds-service-accounts, dc=int, dc=tt, dc=localand that password to your ldap server using i.e.ldapsearchor some other tool ? -
filter: "(cn={0})"means that whatever you are entering as a username in curl or kibana login form should be the CN of that user you want to login with, isdmartinezthe CN of your user in ldap ?