Hi Jochen,
Thank You for the support. Here
1)**
Using REST endpoint , I am trying to PUT the renewed licience - As license string is not visible sg_config.yml file
PUT /_searchguard/api/license/
{
"sg_license": <licensestring>
}
Here i am using nss to SSL for curl| certificate database and imported certificates
SSL_DIR=~/nss curl -vk --cert bdsys --pass xxxx -sS -XGET 'https://xxxx:xxx/_searchguard/api/license/' (same for all the /_searchguard/api/<configuration type>/)
* About to connect() to
xxx.com port xxx (#0)
* Trying 45.54.150.170... connected
* Connected to
dxxx.com (45.54.150.170) port xxx (#0)
* Initializing NSS with certpath: sql:/xx/xx/nss
* warning: ignoring value of ssl.verifyhost
* skipping SSL peer certificate verification
* NSS: using client certificate: bdsys
* subject: CN=bdsys,O=xxx,L=xxx,ST=xxx,C=US
* start date: Jan 03 20:28:37 2018 GMT
* expire date: Jan 02 20:28:37 2023 GMT
* common name: bdsys
* issuer: CN=BD-sd,O=xxx,ST=xxx,C=US
* SSL connection using TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
* Server certificate:
* subject: CN=actualserver,OU=xxx,O=UP,L=xxx,ST=xxx,C=US
* start date: Oct 19 21:41:00 2017 GMT
* expire date: Oct 18 21:41:00 2020 GMT
* common name: actualserver
* issuer: CN=web CA,DC=xx,DC=xx,DC=xx,DC=com
> GET /_searchguard/api/actiongroups/ HTTP/1.1
> User-Agent: curl/7.19.7 (x86_64-redhat-linux-gnu) libcurl/7.19.7 NSS/3.21 Basic ECC zlib/1.2.3 libidn/1.18 libssh2/1.4.2
> Host: dxx.com:xxx
> Accept: */*
>
< HTTP/1.1 403 Forbidden
< access-control-allow-credentials: true
< content-type: application/json; charset=UTF-8
< content-length: 191
<
* Connection #0 to host
xxx.com left intact
* Closing connection #0
{"status":"FORBIDDEN","message":"No permission to access REST API: Role based access not enabled.. SG admin permissions required but CN=bdsys,O=xxx,L=xxx,ST=xxx,C=US is not an admin"}
How should i PUT the updated license with REST endpoint with admin certificate?
---sg_roles_mappimg.yml--
sg_all_access:
users:
- "CN=bdsys,O=X,L=xxx,ST=xx,C=x"
--elasticsearch.yml---
searchguard.authcz.admin_dn:
- "CN=bd-admin,O=X,L=xxx,ST=xx,C=x" --admin certificate
curl -k --cert bdsys:**** -sS -XGET 'https://devxxxxx.com:xxx/_searchguard/authinfo'?pretty
{
"user" : "User [name=bdsys, roles=[], requestedTenant=null]",
"user_name" : "bdsys",
"user_requested_tenant" : null,
"remote_address" : "xxxxx:56276",
"backend_roles" : [ ],
"custom_attribute_names" : [ ],
"sg_roles" : [
"sg_all_access",
"sg_own_index"
],
"sg_tenants" : {
"test_tenant_ro" : true,
"adm_tenant" : true,
"bdmsys" : true
},
"principal" : "CN=bdsys,O=xx,L=xxx,ST=xxx,C=xxx",
"peer_certificates" : "2"
}
--------------------------------------------------------
2)**
--sg_config.yml----
kibana:
multitenancy_enabled: true
server_username: "db345"
index: ".kibana"
As i kw the "Kibana server user"used for maintenance, managing the .kibana index
We are not using any visualizations, When do i actually use the kibana server user name for any operations in the process of SG license renewel?
-------------------------------