Thanks for the quick response.
There are no errors in elastic or kibana logs as far as I can see. And as a side note: there is not so much authentication information there in the logs even though i have set:
logger.sg.name = com.floragunn.dlic.auth.http.jwt
logger.sg.level = trace
I can justs see that the user was able to authenticate from the elastic logs
[2021-02-02T16:36:22,331][DEBUG][c.f.s.a.BackendRegistry ] [elastic01.node.com] Check authdomain for rest internal/1 or 2 in total
[2021-02-02T16:36:22,332][DEBUG][c.f.s.a.BackendRegistry ] [elastic01.node.com] Rest user 'User [name=kibanaserver, backend_roles=[], requestedTenant=null]' is authenticated
[2021-02-02T16:36:22,332][DEBUG][c.f.s.a.BackendRegistry ] [elastic01.node.com] sgtenant 'null'
[2021-02-02T16:36:22,332][DEBUG][c.f.s.p.PrivilegesEvaluator] [elastic01.node.com] ### evaluate permissions for User [name=kibanaserver, backend_roles=[], requestedTenant=null] on elastic01.node.com
[2021-02-02T16:36:22,332][DEBUG][c.f.s.p.PrivilegesEvaluator] [elastic01.node.com] action: cluster:monitor/nodes/info (NodesInfoRequest)
[2021-02-02T16:36:22,333][DEBUG][c.f.s.r.IndexResolverReplacer] [elastic01.node.com] Resolve aliases, indices and types from NodesInfoRequest
[2021-02-02T16:36:22,333][DEBUG][c.f.s.p.PrivilegesEvaluator] [elastic01.node.com] requestedResolved : Resolved [aliases=[*], indices=[*], allIndices=[*], types=[*], originalRequested=[], remoteIndices=[]]
[2021-02-02T16:36:22,333][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] [elastic01.node.com] raw requestedTenant: 'null'
[2021-02-02T16:36:22,333][DEBUG][c.f.s.p.PrivilegesEvaluator] [elastic01.node.com] Result from privileges interceptor for cluster perm: null
[2021-02-02T16:36:22,333][DEBUG][c.f.s.p.PrivilegesEvaluator] [elastic01.node.com] Allowed because we have cluster permissions for cluster:monitor/nodes/info
[2021-02-02T16:36:22,334][DEBUG][c.f.s.f.SearchGuardFilter] [elastic01.node.com] PrivEvalResponse [allowed=true, missingPrivileges=[], allowedFlsFields=null, maskedFields=null, queries=null]
[2021-02-02T16:36:22,848][DEBUG][c.f.s.a.BackendRegistry ] [elastic01.node.com] Check authdomain for rest noop/0 or 2 in total
[2021-02-02T16:36:22,850][DEBUG][c.f.s.a.BackendRegistry ] [elastic01.node.com] Rest user 'User [name=affected_user, backend_roles=[LONG LIST WITH 39 AD GROUPS], requestedTenant=null]' is authenticated
[2021-02-02T16:36:22,851][DEBUG][c.f.s.a.BackendRegistry ] [elastic01.node.com] sgtenant 'null'
[2021-02-02T16:36:23,262][DEBUG][c.f.s.a.BackendRegistry ] [elastic01.node.com] Check authdomain for rest noop/0 or 2 in total
[2021-02-02T16:36:23,264][DEBUG][c.f.s.a.BackendRegistry ] [elastic01.node.com] 'org.apache.cxf.rs.security.jose.jws.JwsException: INVALID_COMPACT_JWS' extracting credentials from jwt-key-by-oidc http authenticator
org.apache.cxf.rs.security.jose.jws.JwsException: INVALID_COMPACT_JWS
So all in call I can just see:
[2021-02-02T16:36:22,850][DEBUG][c.f.s.a.BackendRegistry ] [elastic01.node.com] Rest user ‘User [name=affected_user, backend_roles=[LONG LIST WITH 39 AD GROUPS], requestedTenant=null]’ is authenticated
This INVALID_COMPACT_JWS
stacktrace at the end belongs to the kibanaserver
login fail since it uses basic auth I assume
I have also tried to use in kibana.yml:
searchguard.auth.debug: true
which does not work due the search guard version
My versions are: elastic and kibana 7.6.2, search guard 41.0.0
Update:
This is how it looks like in the browser: