We are trying to integrate Elasticsearch and Kibana with Active directory for authentication.
we are able to see connectivity btw elasticsearch and AD.
we are trying to se roles.yml as
The default roles file is empty as the preferred method of defining roles is
through the API/UI. File based roles are useful in error scenarios when the
API based roles may not be available.
All cluster rights
All operations on all indices
admin:
cluster: all
indices:
'*': all
Monitoring cluster privileges
All operations on all indices
power_user:
cluster: monitor
indices:
'*': all
Only read operations on indices
user:
indices:
'*': read
Only read operations on indices named events_*
events_user:
indices:
'events_*': read
and
role_mapping.yml as
Role mapping configuration file which has elasticsearch roles as keys
that map to one or more user or group distinguished names
#roleA: this is an elasticsearch role
- groupA-DN this is a group distinguished name
- groupB-DN
- user1-DN this is the full user distinguished name
power_user:
- "cn=user,cn=people,dc=company,dc=com"
superuser:
- "cn=users,dc=example,dc=com"
- "cn=admins,dc=example,dc=com"
- "cn=user,cn=people,dc=company,dc=com"
we need to control authentication using AD and manage Roles in Elastic. any help is appreciated.
in elastic*.yml we have given
xpack:
security:
authc:
realms:
active_directory:
type: active_directory
order: 0
domain_name: company.com
url: ldap://company.com:389
unmapped_groups_as_roles: true