Add CamelCase:
Signed-off-by: Naarcha-AWS <naarcha@amazon.com>
This commit is contained in:
parent
1add8f4bb9
commit
28194d5653
|
@ -25,7 +25,7 @@ opensearch.hosts: ["https://localhost:9200"]
|
|||
opensearch.ssl.verificationMode: full
|
||||
opensearch.username: "kibanaserver"
|
||||
opensearch.password: "kibanaserver"
|
||||
opensearch.requestHeadersallowlist: [ authorization,securitytenant ]
|
||||
opensearch.requestHeadersAllowlist: [ authorization,securitytenant ]
|
||||
server.ssl.enabled: true
|
||||
server.ssl.certificate: /usr/share/opensearch-dashboards/config/client-cert.pem
|
||||
server.ssl.key: /usr/share/opensearch-dashboards/config/client-cert-key.pem
|
||||
|
|
|
@ -46,7 +46,7 @@ Setting | Description
|
|||
```yml
|
||||
opensearch.username: kibanaserver
|
||||
opensearch.password: kibanaserver
|
||||
opensearch.requestHeadersallowlist: ["securitytenant","Authorization"]
|
||||
opensearch.requestHeadersAllowlist: ["securitytenant","Authorization"]
|
||||
opensearch_security.multitenancy.enabled: true
|
||||
opensearch_security.multitenancy.tenants.enable_global: true
|
||||
opensearch_security.multitenancy.tenants.enable_private: true
|
||||
|
@ -56,7 +56,7 @@ opensearch_security.multitenancy.enable_filter: false
|
|||
|
||||
Setting | Description
|
||||
:--- | :---
|
||||
`opensearch.requestHeadersallowlist` | OpenSearch Dashboards requires that you allowlist all HTTP headers that it passes to OpenSearch. Multi-tenancy uses a specific header, `securitytenant`, that must be present with the standard `Authorization` header. If the `securitytenant` header is not on the allowlist, OpenSearch Dashboards starts with a red status.
|
||||
`opensearch.requestHeadersAllowlist` | OpenSearch Dashboards requires that you allowlist all HTTP headers that it passes to OpenSearch. Multi-tenancy uses a specific header, `securitytenant`, that must be present with the standard `Authorization` header. If the `securitytenant` header is not on the allowlist, OpenSearch Dashboards starts with a red status.
|
||||
`opensearch_security.multitenancy.enabled` | Enables or disables multi-tenancy in OpenSearch Dashboards. Default is true.
|
||||
`opensearch_security.multitenancy.tenants.enable_global` | Enables or disables the global tenant. Default is true.
|
||||
`opensearch_security.multitenancy.tenants.enable_private` | Enables or disables the private tenant. Default is true.
|
||||
|
|
|
@ -309,7 +309,7 @@ opensearch.password: "kibanaserver"
|
|||
opensearch.ssl.verificationMode: none
|
||||
|
||||
# allowlist basic headers and multi-tenancy header
|
||||
opensearch.requestHeadersallowlist: ["Authorization", "security_tenant"]
|
||||
opensearch.requestHeadersAllowlist: ["Authorization", "security_tenant"]
|
||||
```
|
||||
|
||||
|
||||
|
|
|
@ -195,7 +195,7 @@ config:
|
|||
To pass the user and role headers that the authenticating proxy adds from OpenSearch Dashboards to the security plugin, add them to the HTTP header allowlist in `opensearch_dashboards.yml`:
|
||||
|
||||
```yml
|
||||
opensearch.requestHeadersallowlist: ["securitytenant","Authorization","x-forwarded-for","x-proxy-user","x-proxy-roles"]
|
||||
opensearch.requestHeadersAllowlist: ["securitytenant","Authorization","x-forwarded-for","x-proxy-user","x-proxy-roles"]
|
||||
```
|
||||
|
||||
You must also enable the authentication type in `opensearch_dashboards.yml`:
|
||||
|
|
Loading…
Reference in New Issue