Skip to content

Conversation

@chriswhite199
Copy link

Description

Update LDAP documentation for secure password and pemkey_password settings

Issues Resolved

Version

  • TBC - Once above PR is accepted, merged and potentially backported if requested

Checklist

  • By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license and subject to the Developers Certificate of Origin.

See associated PR for implementation: opensearch-project/security#5323

Signed-off-by: Chris White <[email protected]>
@github-actions
Copy link

Thank you for submitting your PR. The PR states are In progress (or Draft) -> Tech review -> Doc review -> Editorial review -> Merged.

Before you submit your PR for doc review, make sure the content is technically accurate. If you need help finding a tech reviewer, tag a maintainer.

When you're ready for doc review, tag the assignee of this PR. The doc reviewer may push edits to the PR directly or leave comments and editorial suggestions for you to address (let us know in a comment if you have a preference). The doc reviewer will arrange for an editorial review.

For increased security, you should use the opensearch keystore and add a corresponding entry for your authn / authz setting via the `password_secure` property:

```bash
./bin/opensearch-keystore add authc.ldap.authentication_backend.config.pasword_secure
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

typo in pasword_secure?

@kolchfa-aws
Copy link
Collaborator

@chriswhite199 Is this PR still applicable?

@chriswhite199
Copy link
Author

No, the code branch met some issues. This can be rejected/closed

@kolchfa-aws kolchfa-aws closed this Feb 3, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Tech review PR: Tech review in progress

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants