Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Configuring LDAP Authentication in OpenSearch blog post #2497

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

smortex
Copy link
Contributor

@smortex smortex commented Dec 14, 2023

From time to time, a question about LDAP setup appear on Slack. We setup LDAP some time ago and the process was a bit tedious, but in the process we learned to check step by step the configuration.

Add a blog post that drive users into configuring LDAP authc / authz, give pointers about what is going on at each step and show how to check that each step is successful.

@smortex
Copy link
Contributor Author

smortex commented Dec 14, 2023

I fixed a bunch of style issues, but the remaining ones looks weird… I am not sure about how to handle them.

  • The "is a heading and should be in sentence case" do not make sense since the headers are not capitalized as a heading but as a sentence;
  • The "If you are referencing a setting, variable, format, function, or repository, surround it with tic marks" seems false positive since these are examples.

title: Configuring LDAP Authentication in OpenSearch
authors:
- smortex
date: 2023-12-14 14:20:00 -1000
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I had to put a date so I put a date, but there is no constraint on that date and we can change it.

All users are members of the *users* group, and administrators are also members of the *admins* group.
For this simple example, we want all authenticated users to have a read-only access to everything, and administrators to have a read-write access to everything.

In order to do this, we must map the *users* backend role to the *readall* and *kibana\_users* roles, and the *admins* backend role to the *all_access* role.
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I really lack a roles and permissions cheat-sheet… I feel like this is correct, but maybe there is more sensible roles to use, in which case I will be happy to learn and adjust the blog post.

@krisfreedain
Copy link
Member

wow - this looks amazing @smortex - we'll get some eyes on it over here as well

@krisfreedain
Copy link
Member

@pajuric - are you able to get someone to help with the tech review on this?

From time to time, a question about LDAP setup appear on Slack.  We
setup LDAP some time ago and the process was a bit tedious, but in the
process we learned to check step by step the configuration.

Add a blog post that drive users into configuring LDAP authc / authz,
give pointers about what is going on at each step and show how to check
that each step is successful.

Signed-off-by: Romain Tartière <romain@blogreen.org>
@smortex smortex force-pushed the configure-ldap-authentication branch from a708851 to d37b9f4 Compare March 13, 2024 05:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: In Progress
Development

Successfully merging this pull request may close these issues.

3 participants