If you would like to get more specific use case details, I'm more than 
willing to exchange emails or engage in phone calls.

Michael

On Wednesday, April 29, 2015 at 10:34:25 PM UTC-4, Michael Young wrote:
>
> I thought that might be the case.
>
> The problem with Shield for my use case is authentication and 
> authorization are closely tied together.  Generally speaking, we want to 
> limit access to indexes via LDAP/AD groups which are assigned to Shield 
> roles.  We want to be able to use a "system/daemon" account to query 
> Elasticserach, but pass in a "proxy" or "impersonation" user which can be 
> used to looked up to see what effective groups they have and from which 
> indexes they can get results.  Without the proxy user ability, we are 
> forced to login the user via their username and password.  The problem is 
> that users will not directly access Easticsearch and we don't have access 
> to their password.
>
> Our users will be authenticated via a separate application/user interface 
> which will be using single sign on tokens.  The application doesn't have 
> access to the user's password to pass to Elasticsearch.  So there isn't an 
> easy way to say "I have user1234 running a query and I need you to filter 
> index results appropriately for this authenticated user".
>
> We want to manage index permissions using LDAP/AD groups and roles using 
> Shield.  We don't want to have to do that in the application.  The current 
> work around seems to be some sort of api overlay to elasticsearch which 
> will first check to see if the user exists using an admin account.  If the 
> user account doesn't exist (first time logging in), then create the user 
> account using a hash of the users group permissions from LDAP/AD.  It's not 
> ideal, but it'll probably get the job done until Shield is 
> extended/enhanced.
>
> On Wednesday, April 29, 2015 at 5:03:51 PM UTC-4, Jay Modi wrote:
>>
>> Hi Michael,
>>
>> We don't currently have a way to do this with Shield. Can you tell us a 
>> little more about your scenario? Your users are logging into your 
>> application and then accessing data in Elasticsearch, which is protected by 
>> Shield?
>>
>> This type of information is helpful for us as we plan features for future 
>> releases of Shield.
>>
>> -Jay
>>
>> On Wednesday, April 29, 2015 at 3:06:57 PM UTC-4, Michael Young wrote:
>>>
>>> I have Elasticsearch 1.5.2 and Shield 1.2.0 configured and working 
>>> against Active Directory.  This seems to work pretty well.  However, I was 
>>> wondering if there was a way to pass in a "proxy user" from an application 
>>> to get the appropriate index filtering via access controls without having 
>>> to pass in the username AND password from the application.
>>>
>>> Is there a way to do this with Shield?
>>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"elasticsearch" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to elasticsearch+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/elasticsearch/0c3ffd20-be82-4acb-b7cb-ee8a8db768ba%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to