yes, authentication succeeded! now its about the roles ...
···
Am 14.03.2018 um 21:39 schrieb ivy2@uchicago.edu:
I think, I am getting somewhere after changing usersearch.
Now in the web browser I am getting an error:
{"error":{"root_cause":[{"type":"security_exception","reason":"no permissions for [cluster:monitor/main] and User [name=ivy2, roles=, requestedTenant=null]"}],"type":"security_exception","reason":"no permissions for [cluster:monitor/main] and User [name=ivy2, roles=, requestedTenant=null]"},"status":403}
Does that mean that I finally got through LDAP but I need to configure the role somehow?
The logs and configuration are attached.
On Wednesday, March 14, 2018 at 2:45:59 PM UTC-5, iv...@uchicago.edu wrote:
On Wednesday, March 14, 2018 at 11:34:06 AM UTC-5, Search Guard wrote:
connection seems ok but the user is not found.
you need to set these props correctly:userbase:
username_attribute:
usersearch:
see LDAP Authentication | Security for Elasticsearch | Search Guard
It does not really explain to me how to find out those strings.
Based on the fact that ldapsearch works:ldapsearch -x -v -h ldap.rcc.uchicago.edu -p 389 -b "uid=ivy2,ou=People,dc=rcc,dc
=uchicago,dc=edu"I tried the following:
authentication_backend:
bind_dn: 'ou=People,dc=rcc,dc=uchicago,dc=edu'
userbase: 'ou=People,dc=rcc,dc=uchicago,dc=edu'
usersearch: '(sAMAccountName={0})'
username_attribute: uidauthz:
bind_dn: 'ou=People,dc=rcc,dc=uchicago,dc=edu'
rolebase: 'ou=People,dc=rcc,dc=uchicago,dc=edu'
rolesearch: '(member={0})'
userbase: 'ou=People,dc=rcc,dc=uchicago,dc=edu'
usersearch: '(uid={0})'On Wednesday, 14 March 2018 17:10:50 UTC+1,
On Wednesday, March 14, 2018 at 11:02:43 AM UTC-5, Search Guard wrote:
nothing attachedOh, sorry, fixed.
How important are permissions on certificate files? Originally there were complaints about insecure permissions. I fixed that.
Also, to double check how changes from sg_config.yml propagate into Elastic Search: once I change this file, I run:
/home_local/elasticsearch/elasticsearch-6.2.1/plugins/search-guard-6/tools/sgadmin.sh -cd /home_local/elasticsearch/ela
sticsearch-6.2.1/plugins/search-guard-6/sgconfig -icl -key /home_local/elasticsearch/elasticsearch-6.2.1/config/HadoopC
ertificates/hadoop.rcc.uchicago.edu-key.pem -cert /home_local/elasticsearch/elasticsearch-6.2.1/config/HadoopCertificat
es/hadoop.rcc.uchicago.edu-chain.crt -cacert /home_local/elasticsearch/elasticsearch-6.2.1/config/HadoopCertificates/in
common.crt -nhnvfrom tools directory and get messages that the changes were successful (provided that elastic search is running).
As far as I understand, elasticsearch does not have to be restarted after such changes?On Wednesday, 14 March 2018 16:58:53 UTC+1
On Wednesday, March 14, 2018 at 6:44:38 AM UTC-5, Search Guard wrote:
If ldapsearch -x -v -h ldap.rcc.uchicago.edu -p 389 -b "uid=ivy2,ou=People,dc=rcc,dc=uchicago,dc=edu" works then you can also tryenable_ssl: false
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: false
hosts:
- ldap.rcc.uchicago.edu:389
- ldap.uchicago.edu:389It still does not work. The logs and the configuration file is attached.
I have root access to ldap.rcc.uchicago.edu. Is there some log that would tell if my request reaches LDAP server and if it does, why the user is not found?
At first glance, I did not find such a log.> Am 14.03.2018 um 02:16 schrieb Igor Yakushin <iv...@uchicago.edu>:
>
>
>
> On Tue, Mar 13, 2018 at 5:54 PM, SG <in...@search-guard.com> wrote:
> pls add this to the sg_config.yml (same indent level as enable_ssl)
>
> pemtrustedcas_filepath: HadoopCertificates/incommon.crt
>
>
> The error changed but still no luck. The files are attached.
>
> Is the user from which account Elastic Search is running supposed to be known to LDAP? I created a local elasticsearch account that LDAP does not know about. Does it matter?
>
> If I can run ldapsearch from this account successfully:
> ldapsearch -x -v -h ldap.rcc.uchicago.edu -p 389 -b "uid=ivy2,ou=People,dc=rcc,dc=uchicago,dc=edu"
> does it tell anything about SearchGuard's ability to use LDAP or this is not related?
>
>
>
>
> --
> You received this message because you are subscribed to the Google Groups "Search Guard Community Forum" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to search-guard...@googlegroups.com.
> To post to this group, send email to search...@googlegroups.com.
> To view this discussion on the web visit https://groups.google.com/d/msgid/search-guard/CALQ0CdW9ha_0AWe4ikAfunbO_eYCZv26D7J_2bbZai%3DmJD_PRA%40mail.gmail.com\.
> For more options, visit https://groups.google.com/d/optout\.
> <log.txt><sg_config.yml>--
You received this message because you are subscribed to the Google Groups "Search Guard Community Forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to search-guard+unsubscribe@googlegroups.com.
To post to this group, send email to search-guard@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/search-guard/81c285c6-6d66-4217-9752-7516288aa10d%40googlegroups.com\.
For more options, visit https://groups.google.com/d/optout\.
<log.txt><sg_config.yml>