LDAP or AD implementation in ELK

Hi,

I'm trying to setup LDAP authentication in my ELK. My Org has AD/LDAP implemented with in same setup. I used the following settings in my elasticsearch.yml

xpack.security.enabled: true
xpack.security.transport.ssl.enabled: true
xpack.watcher.enabled: true
xpack.security.transport.ssl.verification_mode: none

xpack:
security:
authc:
realms:
ldap1:
type: ldap
order: 0
url: "ldap://entldap.corp.com:3268"
bind_dn: "CN=elkldap,OU=Service Accounts,OU=Privileged Accounts,OU=_restricted,DC=corp,DC=com"
bind_password: "!23WeVG"
user_search:
base_dn: DC=euro,DC=corp,DC=com"
group_search:
base_dn: DC=euro,DC=corp,DC=com"
files:
role_mapping: "/etc/elasticsearch/role_mapping.yml"
unmapped_groups_as_roles: false

Are there any issues with this config? With this info; when I try to do the following, My authentication fails and I dont see anything in the elastic log despite having the debug enabled.

curl -u rajesh@euro.corp.com http://localhost:9200

Are there any implementation document/SOP for this other than the doc to configure the realms? A sample file could help.

this is paid product.
you might want to call elastic if you already has license for it.

the issue was that the ldap password was stored in keystore which did not pick my manual input. it is now resolved

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.