This could be due to the character encoding or formatting issue in the configuration. To troubleshoot this problem, you can try the following steps:
Hello everyone. I have deployed a wazuh cluster on 6 machines. I would like to set up authorization using Windows AD. I have configured the OpenSearch configuration according to the documentation. Here is my config
```
root@wazuh-indexer01:/# cat /etc/wazuh-indexer/opensearch-security/config.yml
_meta:
type: "config"
config_version: 2
config:
dynamic:
http:
anonymous_auth_enabled: false
xff:
enabled: false
internalProxies: '192\.168\.0\.10|192\.168\.0\.11' # regex pattern
authc:
basic_internal_auth_domain:
description: "Authenticate via HTTP Basic against internal users database"
http_enabled: true
transport_enabled: true
order: 4
http_authenticator:
type: basic
challenge: true
authentication_backend:
type: intern
ldap:
description: "Authenticate via LDAP or Active Directory"
http_enabled: true
transport_enabled: true
order: 5
http_authenticator:
type: basic
challenge: true
authentication_backend:
type: ldap
config:
hosts:
- aebank.lan:389
bind_dn: "cn=wazuh,cn=Users,dc=my,dc=dom"
password: "********"
userbase: 'dc=my,dc=dom'
usersearch: '(sAMAccountName={0})'
username_attribute: null
authz:
roles_from_myldap:
description: "Authorize via LDAP or Active Directory"
http_enabled: true
transport_enabled: true
authorization_backend:
type: ldap
config:
hosts:
- aebank.lan:389
bind_dn: "cn=wazuh,cn=Users,dc=my,dc=dom"
password: "********"
rolebase: 'ou=normalOU,dc=my,dc=dom'
rolesearch: '(member={0})'
userroleattribute: null
userrolename: disabled
rolename: 'dn'
resolve_nested_roles: true
userbase: 'dc=my,dc=dom'
usersearch: '(uniqueMember={0})'
skip_users:
roles_from_another_ldap:
description: "Authorize via another Active Directory"
http_enabled: false
transport_enabled: false
authorization_backend:
type: ldap
```
## Default roles mapping
```roles_mapping.yaml
all_access:
reserved: false
backend_roles:
- "admin"
- "CN=Admins,OU=normalOU,DC=my,DC=dom"
- "*"
description: "Maps admin to all_access"
own_index:
reserved: false
users:
- "*"
description: "Allow full access to an index named like the username"
logstash:
reserved: false
backend_roles:
- "logstash"
readall:
reserved: false
backend_roles:
- "readall"
manage_snapshots:
reserved: false
hidden: false
backend_roles:
- "snapshotrestore"
kibana_server:
reserved: true
users:
- "kibanaserver"
kibana_user:
reserved: false
backend_roles:
- "kibanauser"
# Wazuh monitoring and statistics index permissions
manage_wazuh_index:
reserved: false
users:
- "kibanaserver"
```
There are users with Russian and Latin names in this OU. The user ``ldap`` and ``wazuh`` are being authorized. But ```Иванов_ИИ``` it does not pass. I'm asking for help, I haven't been able to solve this problem for several months.
Thanks a lot for the answer. Are there any other configuration files besides the ones I have already configured? All our hosts are connected to our AD domain and they are authorized with the following usernamesчетверг, 23 ноября 2023 г. в 19:47:24 UTC+9, Antonio Kim (Wazuh):