CARVIEW |
Securing Splunk Enterprise
- Install Splunk Enterprise securely
- Secure your admin account
- About TLS encryption and cipher suites
- Securing Splunk Enterprise with FIPS
- About default certificate authentication
- Secure Splunk Enterprise on your network
- Disable unnecessary Splunk Enterprise components
- Secure Splunk Enterprise service accounts
- Deploy secure passwords across multiple servers
- Harden the network port that App Key Value Store uses
- Some best practices for your servers and operating system
- Use access control to secure Splunk data
- About user authentication
- About configuring role-based user access
- About defining roles with capabilities
- Add and edit roles with Splunk Web
- Add and edit roles with authorize.conf
- Configure access to manager consoles and apps in Splunk Enterprise
- Find existing users and roles
- Delete all user accounts
- Secure access for Splunk knowledge objects
- Use network access control lists to protect your deployment
- Set up user authentication with LDAP
- Manage Splunk user roles with LDAP
- LDAP prerequisites and considerations
- Secure LDAP authentication with transport layer security (TLS) certificates
- How the Splunk platform works with multiple LDAP servers for authentication
- Configure LDAP with Splunk Web
- Map LDAP groups to Splunk roles in Splunk Web
- Configure LDAP with the configuration file
- Map LDAP groups and users to Splunk roles using configuration files
- Test your LDAP configuration on Splunk Enterprise
- Change authentication schemes from native to LDAP on Splunk Enterprise
- Remove an LDAP user safely on Splunk Enterprise
- Configure single sign-on with SAML
- Configure SSO with PingIdentity as your SAML identity provider
- Configure SSO with Okta as your identity provider
- Configure SSO with Microsoft Azure AD or AD FS as your Identity Provider
- Configure SSO with OneLogin as your identity provider
- Configure SSO with Optimal as your identity provider
- Configure SSO in Computer Associates (CA) SiteMinder
- Secure SSO with TLS certificates
- Configuring SAML in a search head cluster
- Configure Ping Identity with leaf or intermediate SSL certificate chains
- Configure SAML SSO for other IdPs
- Configure advanced settings for SSO
- Map groups on a SAML identity provider to Splunk roles
- Modify or remove role mappings
- Configure SAML SSO in the configuration files
- Troubleshoot SAML SSO
- How to set up multifactor Authentication with Duo ...
- Splunk Cloud MFA with Google Authenticator
- Does Splunk Cloud support DUO two factor authentic...
- 2FA for splunk cloud trial
- Is there a way to create user with admin rights an...
- Getting errors when configuring Duo MFA via UI or ...
- How does DUO authentication for SPLUNK work?
- Migration to Splunk cloud
- Change SSL Certificate port 8089 Breaks DUO Authen...
About multifactor authentication with Duo Security
Multifactor authentication allows you to configure a primary and secondary login for your Splunk Enterprise users.
Note: Duo Security multifactor authentication secures Splunk Web logins. We recommend that you also secure your users with a firewall.
Splunk Enterprise with Duo Security multifactor authentication requires the user to set up a second authentication method and then use that method for future logins:
1. User logs into their Enterprise Splunk Web homepage using their login credentials. This is the primary login.
2. User then sees a second login page: "Duo Authentication". This is the secondary login.
3. The first time a user logs in, they follow the instructions on the Duo login page to set up their preferred method for accessing their secondary credentials:
- Login with credentials sent via a push notification on your your smart phone (Duo Security Mobile app required).
- Login with credentials sent via SMS message sent to your cell phone.
- Login with credentials sent via via a phone call made to your cell phone.
- Login by entering a one time code generated by the Duo Mobile app.
4. After the initial login and configuration, every time the user arrives at the secondary login, they receive those login credentials using their preferred method.
About setting up Duo Security for multifactor authentication in Splunk
1. Create an account for your Splunk Enterprise configuration on the Duo website. See https://duo.com for more information.
2. Provide Splunk Enterprise with the information from your Duo Security Account. See Configure Splunk to use Duo Security multifactor authentication for more information.
Remove an LDAP user safely on Splunk Enterprise | Configure Splunk Enterprise to use Duo Security multifactor authentication |
This documentation applies to the following versions of Splunk® Enterprise: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2
Comments
About multifactor authentication with Duo Security
You must be logged into splunk.com in order to post comments. Log in now.
Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.
Your Comment Has Been Posted Above
Feedback submitted, thanks!