We use ‘admin’ as root_username in server.conf and our Security says
they see errors in LDAP logs as if Graylog tries to perform lookups using that user.
Is there a way to prevent Graylog from doing LDAP authentications with the admin user
or is it best to switch username to something else ?
Maybe the best if you use an LDAP user with admin rights.
Unfortunately I have never understood why users use admin/root users. It’s for emergency use. Use every user own user.
Thanks for your reply.
Everyone is able to login on our Graylog cluster using their AD user authenticated against our LDAP server. These are regular users, no admin/root users except us syadmins who have the admin role.
This regards the, i presume, internal root graylog user (which is called admin).
Does Graylog use that user to perform LDAP queries ?
rename the root_username to something that is not part of your LDAP. Like “graylog_admin_user” and use this only when LDAP is not working with your unique user like @macko003 already wrote .
@shoothub rename the default admin and in Graylog to something that is not in LDAP and it will work.
you can actually configure the order and default is to ask the build in admin user as latest. Means when Graylog itself is polling itself this will create a request to LDAP and if the very same username is given a “wrong password” message and it will then be successful on the last provider which is the build in password.