Thanks for the details; I personally am more of a fan of the second 
approach as well.

Kerberos is on the Shield roadmap, but we don't have it pegged to a date on 
the roadmap and features on the roadmap will change priorities so I can't 
really give a time frame.

On Tuesday, May 5, 2015 at 5:27:03 PM UTC-4, Michael Young wrote:
>
> I think there are merits to both of the approaches you suggest.  For our 
> particular use case, we were hoping to pass AD/LDAP username only which 
> Shield then uses to perform an AD/LDAP look-up and restricts access 
> accordingly.  Shield could use a bind username/password to get the list of 
> groups for a specified user so the only thing we need to pass in is the 
> "acting as" or proxy username.  The assumption should be the user has 
> already been authenticated.
>
> We could certainly work with a solution that requires us to pass in the 
> authorization information consisting of a list of the AD/LDAP groups.  That 
> wouldn't be overly difficult for us.  I would be concerned with someone 
> being able to spoof a request by providing a list of groups.  By passing in 
> only the username (acting as), then we can ensure that appropriate 
> restrictions/filters will always be applied.
>
> We'll eventually migrate to a Kerberos implementation at some point across 
> the entire stack.  Is there any intent to enable Kerberos support in 
> Shield?  If there is, what sort of time frame are we looking at?
>
>
> --
> Michael
>
> On Fri, May 1, 2015 at 2:28 PM, Jay Modi <j...@elastic.co <javascript:>> 
> wrote:
>
>> Thanks Michael. Are you interested in Shield performing the authorization 
>> with AD/LDAP for a given proxy user (assumed as being authenticated by your 
>> application) or would/can your application also pass the authorization 
>> information and then Shield restricts access accordingly?
>>
>>
>> On Wednesday, April 29, 2015 at 10:34:54 PM UTC-4, Michael Young wrote:
>>>
>>> If you would like to get more specific use case details, I'm more than 
>>> willing to exchange emails or engage in phone calls.
>>>
>>> Michael
>>>
>>> On Wednesday, April 29, 2015 at 10:34:25 PM UTC-4, Michael Young wrote:
>>>>
>>>> I thought that might be the case.
>>>>
>>>> The problem with Shield for my use case is authentication and 
>>>> authorization are closely tied together.  Generally speaking, we want to 
>>>> limit access to indexes via LDAP/AD groups which are assigned to Shield 
>>>> roles.  We want to be able to use a "system/daemon" account to query 
>>>> Elasticserach, but pass in a "proxy" or "impersonation" user which can be 
>>>> used to looked up to see what effective groups they have and from which 
>>>> indexes they can get results.  Without the proxy user ability, we are 
>>>> forced to login the user via their username and password.  The problem is 
>>>> that users will not directly access Easticsearch and we don't have access 
>>>> to their password.
>>>>
>>>> Our users will be authenticated via a separate application/user 
>>>> interface which will be using single sign on tokens.  The application 
>>>> doesn't have access to the user's password to pass to Elasticsearch.  So 
>>>> there isn't an easy way to say "I have user1234 running a query and I need 
>>>> you to filter index results appropriately for this authenticated user".
>>>>
>>>> We want to manage index permissions using LDAP/AD groups and roles 
>>>> using Shield.  We don't want to have to do that in the application.  The 
>>>> current work around seems to be some sort of api overlay to elasticsearch 
>>>> which will first check to see if the user exists using an admin account.  
>>>> If the user account doesn't exist (first time logging in), then create the 
>>>> user account using a hash of the users group permissions from LDAP/AD.  
>>>> It's not ideal, but it'll probably get the job done until Shield is 
>>>> extended/enhanced.
>>>>
>>>> On Wednesday, April 29, 2015 at 5:03:51 PM UTC-4, Jay Modi wrote:
>>>>>
>>>>> Hi Michael,
>>>>>
>>>>> We don't currently have a way to do this with Shield. Can you tell us 
>>>>> a little more about your scenario? Your users are logging into your 
>>>>> application and then accessing data in Elasticsearch, which is protected 
>>>>> by 
>>>>> Shield?
>>>>>
>>>>> This type of information is helpful for us as we plan features for 
>>>>> future releases of Shield.
>>>>>
>>>>> -Jay
>>>>>
>>>>> On Wednesday, April 29, 2015 at 3:06:57 PM UTC-4, Michael Young wrote:
>>>>>>
>>>>>> I have Elasticsearch 1.5.2 and Shield 1.2.0 configured and working 
>>>>>> against Active Directory.  This seems to work pretty well.  However, I 
>>>>>> was 
>>>>>> wondering if there was a way to pass in a "proxy user" from an 
>>>>>> application 
>>>>>> to get the appropriate index filtering via access controls without 
>>>>>> having 
>>>>>> to pass in the username AND password from the application.
>>>>>>
>>>>>> Is there a way to do this with Shield?
>>>>>>
>>>>>  -- 
>> You received this message because you are subscribed to a topic in the 
>> Google Groups "elasticsearch" group.
>> To unsubscribe from this topic, visit 
>> https://groups.google.com/d/topic/elasticsearch/Hmn1KeC9Qco/unsubscribe.
>> To unsubscribe from this group and all its topics, send an email to 
>> elasticsearc...@googlegroups.com <javascript:>.
>> To view this discussion on the web visit 
>> https://groups.google.com/d/msgid/elasticsearch/c7cb2cd6-3ce0-4bd4-9e21-b67fc05b2b46%40googlegroups.com
>>  
>> <https://groups.google.com/d/msgid/elasticsearch/c7cb2cd6-3ce0-4bd4-9e21-b67fc05b2b46%40googlegroups.com?utm_medium=email&utm_source=footer>
>> .
>>
>> For more options, visit https://groups.google.com/d/optout.
>>
>
>

-- 
Please update your bookmarks! We moved to https://discuss.elastic.co/
--- 
You received this message because you are subscribed to the Google Groups 
"elasticsearch" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to elasticsearch+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/elasticsearch/69d7f9ae-9e40-4551-bf17-edc6eefc11e7%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to