Hi All,I have just successfully installed Searchguard 6.3.0-22.3 (in a self configured docker-elk stack running version 6.3.0 - no other plugins installed, and tbh all the versions don't matter) and have finally got to the point of getting ready for production, but there is a serious concern that I have which isn't addressed anywhere else according to my research: where can we store the elasticsearch.user credentials instead of keeping them stored as plaintext inside kibana.yml config e.g. "kibanaserver". Is there a setting to allow us to store the BCrypt hash in kibana.yml instead? I have tried just giving the hashed value but then the authentication fails, also I fear that the server would then be vulnerable to Pass the Hash type exploits/rainbow tables.Ideally I would like to have an internal-users database on the Kibana side of the stack to store the hash and salt but I haven't been able to figure this out for myself yet (e.g. reading credentials from a MySQL database into kibana.yml config file? Seems like overkill...)Please let me know what people are doing in production to avoid these security issues?Thanks,Thom
If the user has access to the config file with the password they would seemingly have access to both the keystore and the environment variable that has the password for the keystore as well.
It may stop a casual wanderer but doesn't really seem to secure anything if someone actually wanted it.