Thanks Michael. Are you interested in Shield performing the authorization with AD/LDAP for a given proxy user (assumed as being authenticated by your application) or would/can your application also pass the authorization information and then Shield restricts access accordingly?
On Wednesday, April 29, 2015 at 10:34:54 PM UTC-4, Michael Young wrote: > > If you would like to get more specific use case details, I'm more than > willing to exchange emails or engage in phone calls. > > Michael > > On Wednesday, April 29, 2015 at 10:34:25 PM UTC-4, Michael Young wrote: >> >> I thought that might be the case. >> >> The problem with Shield for my use case is authentication and >> authorization are closely tied together. Generally speaking, we want to >> limit access to indexes via LDAP/AD groups which are assigned to Shield >> roles. We want to be able to use a "system/daemon" account to query >> Elasticserach, but pass in a "proxy" or "impersonation" user which can be >> used to looked up to see what effective groups they have and from which >> indexes they can get results. Without the proxy user ability, we are >> forced to login the user via their username and password. The problem is >> that users will not directly access Easticsearch and we don't have access >> to their password. >> >> Our users will be authenticated via a separate application/user interface >> which will be using single sign on tokens. The application doesn't have >> access to the user's password to pass to Elasticsearch. So there isn't an >> easy way to say "I have user1234 running a query and I need you to filter >> index results appropriately for this authenticated user". >> >> We want to manage index permissions using LDAP/AD groups and roles using >> Shield. We don't want to have to do that in the application. The current >> work around seems to be some sort of api overlay to elasticsearch which >> will first check to see if the user exists using an admin account. If the >> user account doesn't exist (first time logging in), then create the user >> account using a hash of the users group permissions from LDAP/AD. It's not >> ideal, but it'll probably get the job done until Shield is >> extended/enhanced. >> >> On Wednesday, April 29, 2015 at 5:03:51 PM UTC-4, Jay Modi wrote: >>> >>> Hi Michael, >>> >>> We don't currently have a way to do this with Shield. Can you tell us a >>> little more about your scenario? Your users are logging into your >>> application and then accessing data in Elasticsearch, which is protected by >>> Shield? >>> >>> This type of information is helpful for us as we plan features for >>> future releases of Shield. >>> >>> -Jay >>> >>> On Wednesday, April 29, 2015 at 3:06:57 PM UTC-4, Michael Young wrote: >>>> >>>> I have Elasticsearch 1.5.2 and Shield 1.2.0 configured and working >>>> against Active Directory. This seems to work pretty well. However, I was >>>> wondering if there was a way to pass in a "proxy user" from an application >>>> to get the appropriate index filtering via access controls without having >>>> to pass in the username AND password from the application. >>>> >>>> Is there a way to do this with Shield? >>>> >>> -- You received this message because you are subscribed to the Google Groups "elasticsearch" group. To unsubscribe from this group and stop receiving emails from it, send an email to elasticsearch+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/elasticsearch/c7cb2cd6-3ce0-4bd4-9e21-b67fc05b2b46%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.