Hello Javier,
first a sketch of AD:
ZZZ.local
|- ...
|-Users
| |- ...
| |-Special01
| | |- bindwazuh
| |- ...
| |-Groups
| | |-Special02
| | | |- wazuh_admin
| | | |- wazuh_reader
| | |- ...
| |- ...
|- ...
part of config.yml:
authc:
...
ldap:
description: "Authenticate via LDAP or Active Directory"
http_enabled: true
transport_enabled: true
order: 1
http_authenticator:
type: "basic"
challenge: true
authentication_backend:
type: "ldap"
config:
enable_ssl: false
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: true
hosts:
- "ldap01xxx:389"
- "ldap02xxx:389"
bind_dn: "CN=bindwazuh,OU=Special01,OU=Users,DC=ZZZ,DC=local"
password: "xxxxx"
userbase: "OU=Users,DC=ZZZ,DC=local"
usersearch: "(sAMAccountName={0})"
username_attribute: "sAMAccountName"
authz:
roles_from_myldap:
description: "Authorize via LDAP or Active Directory"
http_enabled: true
transport_enabled: true
authorization_backend:
type: "ldap"
config:
enable_ssl: false
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: true
hosts:
- "ldap01xxx:389"
- "ldap02xxx:389"
bind_dn: "CN=bindwazuh,OU=Special01,OU=Users,DC=ZZZ,DC=local"
password: "xxxxx"
rolebase: "OU=Special02,OU=Groups,OU=Users,DC=ZZZ,DC=local"
rolesearch: "(member={0})"
userroleattribute: null
userrolename: "disabled"
rolename: "cn"
resolve_nested_roles: true
userbase: "OU=Users,DC=ZZZ,DC=local"
usersearch: "(sAMAccountName={0})"
username_attribute: "sAMAccountName"
Kibana -> Security
wazuh_admin
Cluster permissions: unlimited
Index permissions: *
Internal users: -
Backed roles: wazuh_admin
Tenants: global_tenant
wazuh_reader
Cluster permissions: cluster_composite_ops_ro, cluster_reports_ro
Index permissions: *
Internal users: operator (new internal account)
Backed roles: wazuh_reader, kibanauser
Tenants: global_tenant
Wazuh -> Security
wazuh_admin
roles: readonly
wazuh_reader
roles: administrator
If any other info is needed just tell me :)
Piotr