I have taken out all teh sensitive information. Kibana authentication is working completly fine with self signed certs. After enabling Ldap still it is signing with certs not with LDAP integration. I am getting error as "Authentication finally failed: when I test it with sudo curl -Ss -k “https://host:9200/_cluster/health”
kibana.yml
server.port: 5601
server.host: “hostcom”
server.name: “host.com”
elasticsearch.url: “https://eshost.com:9200”
elasticsearch.preserveHost: true
kibana.index: “.kibana”
searchguard.basicauth.enabled: false
searchguard.cookie.name: searchguard_authentication
searchguard.cookie.secure: true
elasticsearch.requestHeadersWhitelist: [“Authorization”, “sgtenant”, “x-forwarded-for”, “x-forwarded-by” ]
elasticsearch.username: user
elasticsearch.password: pw
elasticsearch.ssl.alwaysPresentCertificate: true
searchguard.allow_client_certificates: true
server.ssl.enabled: true
server.ssl.certificate: keystore.pem
server.ssl.key: key.pem
elasticsearch.ssl.certificateAuthorities: “cert.pem”
elasticsearch.ssl.verificationMode: none
elasticsearch.ssl.certificate: cert.pem
elasticsearch.ssl.key: key.pem
logging.dest: /var/log/kibana/kibana.log
logging.verbose: true
/sg_config.yml
searchguard:
dynamic:
kibana:
do_not_fail_on_forbidden: true
license: “LS”
http:
anonymous_auth_enabled: false
xff:
enabled: false
internalProxies: "."
remoteIpHeader: “x-forwarded-for”
proxiesHeader: “x-forwarded-by”
authc:
jwt_auth_domain:
enabled: true
order: 0
http_authenticator:
type: “jwt”
challenge: false
config:
signing_key: “MI”
jwt_header: “Authorization”
jwt_url_parameter: null
roles_key: “scope”
subject_key: “user_name”
authentication_backend:
type: “noop”
jwt_auth_domain_app:
enabled: true
order: 1
http_authenticator:
type: “jwt”
challenge: false
config:
signing_key: “MI”
jwt_header: “Authorization”
jwt_url_parameter: null
roles_key: “scope”
subject_key: “client_id”
authentication_backend:
type: “noop”
ldap:
http_enabled: true
order: 1
http_authenticator:
type: basic
challenge: false
authentication_backend:
type: ldap
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: true
hosts:
- ldap.com:636
bind_dn: CN=cn,OU=Users,OU=Fun,OU=myou,DC=mygroup,DC=com
password: pw
userbase: OU=myou,DC=mygroup,DC=com
usersearch: ‘(member={0})’
username_attribute: memberof
rolebase: DC=mygroup,DC=com
rolesearch: (&(objectClass=groupOfNames)(cn={0}))
userroleattribute: null
userrolename: memberof
rolename: group
resolve_nested_roles: true
authz:
ldap:
enabled: true
autherization_backend:
type: ldap
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: true
hosts:
- ldap.com:636
bind_dn: CN=cn,OU=Users,OU=Fun,OU=myou,DC=mygroup,DC=com
password: pw
userbase: [“OU=myou,DC=mygroup,DC=com”]
usersearch: ‘(memberof={0})’
username_attribute: memberof
rolebase: OU=myou,DC=mygroup,DC=com
rolesearch: (&(objectClass=groupOfNames)(cn={0}*))
userroleattribute: null
userrolename: memebrof
rolename: groupof
resolve_nested_roles: true