I'm looking to see if there's a solution for authentication users in two different domains that don't exist in the same forest, don't have a common root domain but have a two-way trust between them.
For example: I have a security group in example.com which contains users in other-domain.com. In every application I've used which supports Active Directory authentication, it has been able to authenticate other-domain.com users via the two-way trust with example.com, without needing to directly query other-domain.com domain controllers.
I've tried adding a second Active Directory realm in elasticsearch.yml but elastic dies 5 seconds after startup. I've tried using the recommended Global Catalog port configuration for the URL but I feel like the domain_name property (which is set to example.com) prevents lookups for my.user@other-domain.com or other-domain.com\my.user. It instantly fails authentication.
My expectation here is that this config would permit my.user@another-domain.local to authenticate via the first-domain.com domain controllers. I've tried both the GC ports and 389 in the ldap URLs. If I comment-out the second AD config section, Elastic starts but I can't authentication with another-domain.local user accounts (instantly fails login attempt)
I think part of the problem is that you use the same name for both AD realms. Try naming them something like active_directoy_first and active_directory_second:
Thanks for pointing that out. I didn't realise it was a naming label.
I can now have two AD blocks in there and Elastic boots fine. Unfortunately, login attempts to another-domain.local still fail instantly. On the login page for Kabana i've tried the following username syntax:
another-domain.local\my_user
my_user@another-domain.local
Is there anywhere in Kabana or another place in ElasticSearch i need to configure? How can I debug failed logins?
My x-pack trial period has run out so there are billions of errors . I should probably add a bit more detail for the scenario as well.
There is a Security Group in first-domain.com called ElasticGuys which contains a mix of first-domain.com and another-domain.local users
Elastic role_mapping.yml has been configured to allow ElasticGuys are super users
Users from first-domain.com that are in ElasticGuys can login to Kibana and do anything within the interface
Users from another-domain.local that are in ElasticGuys can't login to Kibana
Is there a requirement for role_mapping.yml to contain a security group defined in another-domain.local to both authentication and role authorisation? i.e. there needs to be a CN=ElasticGuys,OU=Groups,DC=first-domain,DC=com and CN=ElasticGuys,OU=Groups,DC=another-domain,DC=local?
When I use other systems with AD integration, it has always permitted authentication and authorisation for both domains via a single domain controllers groups and users catalog.
sorry, I started to read the topic from the third message
I would start with verification if a user from another-domain can be resolved to ElasticGuys group, e.g. using the AdFind:
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.