#######################################################
opensearch_security.auth.type: “saml”#######################################################
config.yml adjusted (indexer security config via securityadmin.sh) with the following content:
#######################################################
authc:
saml_auth_domain:
http_enabled: true
transport_enabled: false
order: 1
http_authenticator:
type: saml
challenge: true
config:
idp:
metadata_url: “https://login.microsoftonline.com/<tenant-id>/federationmetadata/2007-06/federationmetadata.xml?appid=<app-id>”
entity_id: “https://sts.windows.net/<tenant-id>/”
sp:
entity_id: “wazuh-saml”
kibana_url: “https://wazuhfqdn.tld”
roles_key: “Roles”
exchange_key: “<random-key>”
authentication_backend:
type: noop
#######################################################
and roles_mapping.yml created (indexer via securityadmin.sh or API) with the following content:
#######################################################
all_access:
backend_roles:
- “admin”
- “wazuh_admin” # Azure App Role VALUE
kibana_user:
backend_roles:
- “wazuh_admin”
- “wazuh_readonly”
readall:
backend_roles:
- “wazuh_readonly”
#######################################################
And in server Management -> Security -> Roles mapping -> Mapping for readonly backend_roles FIND wazuh_readonly -> Role readonly
The problem is that users in the read-only group have full access. Someone a good idea?
Thanks a lot!
Amin