While configuring Elastcsearch with LDAP authentication, I am able to connect LDAP users and getting authenticated as per following configuration.
elasticsearch.yml ,
xpack:
security:
authc:
realms:
ldap:
ldap1:
order: 0
url: "ldap://192.168.56.101:389"
user_dn_templates:
- "uid={0},ou=People,dc=example,dc=com"
- "uid={0},cn=guiusers,dc=example,dc=com"
group_search:
base_dn: "dc=example,dc=com"
and below is role_mapping.yml entry,
monitoring:
- "ou=People,dc=example,dc=com"
- "uid=engineer,ou=People,dc=example,dc=com"
now, I have 2 users (ksarkar,engineer) under LDAP location cn=guiusers,dc=example,dc=com.
but both the user not present locally in Kibana users.
using above configuration,
I can connect "engineer" but not getting connected "ksarkar". Having received the same below error in browser for ksarkar (not present in role_mapping.yml),
{"statusCode":403,"error":"Forbidden","message":"Forbidden"}
Is that mandatory to map every user in "role_mapping.yml" file ?
If not then what would be the correct configuration which will facilitate log-in from Kibana GUI, where,
- Users only present in LDAP.
- Role <> group mapped in role_mapping.yml file till gorup not user.