Add CamelCase:

Signed-off-by: Naarcha-AWS <naarcha@amazon.com>
This commit is contained in:
Naarcha-AWS 2022-05-03 14:36:26 -05:00
parent 1add8f4bb9
commit 28194d5653
4 changed files with 5 additions and 5 deletions

View File

@ -25,7 +25,7 @@ opensearch.hosts: ["https://localhost:9200"]
opensearch.ssl.verificationMode: full opensearch.ssl.verificationMode: full
opensearch.username: "kibanaserver" opensearch.username: "kibanaserver"
opensearch.password: "kibanaserver" opensearch.password: "kibanaserver"
opensearch.requestHeadersallowlist: [ authorization,securitytenant ] opensearch.requestHeadersAllowlist: [ authorization,securitytenant ]
server.ssl.enabled: true server.ssl.enabled: true
server.ssl.certificate: /usr/share/opensearch-dashboards/config/client-cert.pem server.ssl.certificate: /usr/share/opensearch-dashboards/config/client-cert.pem
server.ssl.key: /usr/share/opensearch-dashboards/config/client-cert-key.pem server.ssl.key: /usr/share/opensearch-dashboards/config/client-cert-key.pem

View File

@ -46,7 +46,7 @@ Setting | Description
```yml ```yml
opensearch.username: kibanaserver opensearch.username: kibanaserver
opensearch.password: kibanaserver opensearch.password: kibanaserver
opensearch.requestHeadersallowlist: ["securitytenant","Authorization"] opensearch.requestHeadersAllowlist: ["securitytenant","Authorization"]
opensearch_security.multitenancy.enabled: true opensearch_security.multitenancy.enabled: true
opensearch_security.multitenancy.tenants.enable_global: true opensearch_security.multitenancy.tenants.enable_global: true
opensearch_security.multitenancy.tenants.enable_private: true opensearch_security.multitenancy.tenants.enable_private: true
@ -56,7 +56,7 @@ opensearch_security.multitenancy.enable_filter: false
Setting | Description Setting | Description
:--- | :--- :--- | :---
`opensearch.requestHeadersallowlist` | OpenSearch Dashboards requires that you allowlist all HTTP headers that it passes to OpenSearch. Multi-tenancy uses a specific header, `securitytenant`, that must be present with the standard `Authorization` header. If the `securitytenant` header is not on the allowlist, OpenSearch Dashboards starts with a red status. `opensearch.requestHeadersAllowlist` | OpenSearch Dashboards requires that you allowlist all HTTP headers that it passes to OpenSearch. Multi-tenancy uses a specific header, `securitytenant`, that must be present with the standard `Authorization` header. If the `securitytenant` header is not on the allowlist, OpenSearch Dashboards starts with a red status.
`opensearch_security.multitenancy.enabled` | Enables or disables multi-tenancy in OpenSearch Dashboards. Default is true. `opensearch_security.multitenancy.enabled` | Enables or disables multi-tenancy in OpenSearch Dashboards. Default is true.
`opensearch_security.multitenancy.tenants.enable_global` | Enables or disables the global tenant. Default is true. `opensearch_security.multitenancy.tenants.enable_global` | Enables or disables the global tenant. Default is true.
`opensearch_security.multitenancy.tenants.enable_private` | Enables or disables the private tenant. Default is true. `opensearch_security.multitenancy.tenants.enable_private` | Enables or disables the private tenant. Default is true.

View File

@ -309,7 +309,7 @@ opensearch.password: "kibanaserver"
opensearch.ssl.verificationMode: none opensearch.ssl.verificationMode: none
# allowlist basic headers and multi-tenancy header # allowlist basic headers and multi-tenancy header
opensearch.requestHeadersallowlist: ["Authorization", "security_tenant"] opensearch.requestHeadersAllowlist: ["Authorization", "security_tenant"]
``` ```

View File

@ -195,7 +195,7 @@ config:
To pass the user and role headers that the authenticating proxy adds from OpenSearch Dashboards to the security plugin, add them to the HTTP header allowlist in `opensearch_dashboards.yml`: To pass the user and role headers that the authenticating proxy adds from OpenSearch Dashboards to the security plugin, add them to the HTTP header allowlist in `opensearch_dashboards.yml`:
```yml ```yml
opensearch.requestHeadersallowlist: ["securitytenant","Authorization","x-forwarded-for","x-proxy-user","x-proxy-roles"] opensearch.requestHeadersAllowlist: ["securitytenant","Authorization","x-forwarded-for","x-proxy-user","x-proxy-roles"]
``` ```
You must also enable the authentication type in `opensearch_dashboards.yml`: You must also enable the authentication type in `opensearch_dashboards.yml`: