-
Notifications
You must be signed in to change notification settings - Fork 501
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DOC] Using OpenSearch plugins.security.ssl.http.enabled
set to false is an unsupported configuration
#913
Comments
Background; when the TransportClient was removed in the OpenSearch 2.0.0 there was a 'workaround' that would allow for this scenario. With this feature's removal many scenarios are no longer supported and we missed this during release testing. |
FYI @opensearch-project/security |
Does this ticket mean the plugins.security.ssl.http.enabled config param will also be removed? |
Note that the securityadmin documentation at https://opensearch.org/docs/latest/security/configuration/security-admin/ states that the -noopenssl parameter is still a thing but this has been removed it seems. |
Hi! |
@defesteban This is no longer the case since a recent PR was merged into the security repo to allow permissioning to individual security APIs. It was merged into 2.x recently and will be released with version 2.7. There will be a documentation update accompanying the release. |
@cwperks As I understood, you are about this pull request. In the description I can't see anything connected to TLS for REST client, only an ability to provide specific list of permissions for specific users. |
While I don't think its correct to say
Previously we had REST APIs that could only be called through client certification authentication; these changes allow for enabling their access for authenticated users via internal/external IDP. This would allow access to these REST APIs in an environment where TLS termination is managed by other hardware/software. |
Hi @peternied , @cwperks , Are there any updates needed to the documentation? Thanks. |
It's a long time since I looked, but I believe the securityadmin documentation does now say that this is required.
As an aside in my comment above. I believe the |
Thank you @jgough. The securityadmin documentation does highlight the need to setup TLS for HTTP: https://opensearch.org/docs/latest/security/configuration/security-admin/#basic-usage @jgough Thank you for pointing out that there is a now removed setting on the documentation website. I will open a PR to remove the Edit: Opened a PR to remove the |
@hdhalter I think this can be closed |
What do you want to do?
Tell us about your request. Provide a summary of the request and all versions that are affected.
When
plugins.security.ssl.http.enabled
is set to false in the security configuration, it prevents core functions of the security from working. It should be considered an unsupported scenario to run a cluster in this way. We need to make sure this is clear to our users.Said slightly differently, during the setup of a cluster, this setting is viable during basic configuration/setup but with limited functionality.
What other resources are available? Provide links to related issues, POCs, steps for testing, etc.
The text was updated successfully, but these errors were encountered: