CARVIEW |
Securing Splunk Enterprise
- Install Splunk Enterprise securely
- Create secure administrator credentials
- About TLS encryption and cipher suites
- Securing Splunk Enterprise with FIPS
- About default certificate authentication
- Harden the Splunk Enterprise installation directory on Windows
- Secure Splunk Enterprise on your network
- Disable unnecessary Splunk Enterprise components
- Secure Splunk Enterprise service accounts
- Deploy secure passwords across multiple servers
- Harden the network port that App Key Value Store uses
- Some best practices for your servers and operating system
- Password best practices for administrators
- Configure Splunk password policies
- Configure a Splunk Enterprise password policy using the Authentication.conf configuration file
- Password best practices for users
- Unlock a user account
- Change a user password
- Manage out-of-sync passwords in a search head cluster
- Use access control to secure Splunk data
- About user authentication
- About configuring role-based user access
- Define roles on the Splunk platform with capabilities
- Add and edit users
- Add and edit roles with Splunk Web
- Add and edit roles with authorize.conf
- Configure access to manager consoles and apps in Splunk Enterprise
- Find existing users and roles
- Delete all user accounts on Splunk Enterprise
- Secure access for Splunk knowledge objects
- Use network access control lists to protect your deployment
- Set up user authentication with LDAP
- Manage Splunk user roles with LDAP
- LDAP prerequisites and considerations
- Secure LDAP authentication with transport layer security (TLS) certificates
- How the Splunk platform works with multiple LDAP servers for authentication
- Configure LDAP with Splunk Web
- Map LDAP groups to Splunk roles in Splunk Web
- Configure LDAP using configuration files
- Map LDAP groups and users to Splunk roles using configuration files
- Test your LDAP configuration on Splunk Enterprise
- Change authentication schemes from native to LDAP on Splunk Enterprise
- Remove an LDAP user safely on Splunk Enterprise
- About multifactor authentication with Duo Security
- Configure Splunk Enterprise to use Duo Security multifactor authentication
- Configure Duo multifactor authentication for Splunk Enterprise in the configuration file
- About multifactor authentication with RSA Authentication Manager
- Configure RSA authentication from Splunk Web
- Configure Splunk Enterprise to use RSA Authentication Manager multifactor authentication via the REST endpoint
- Configure Splunk Enterprise to use RSA Authentication Manager multifactor authentication in the configuration file
- User experience when logging into a Splunk instance configured with RSA multifactor authentication
- Configure single sign-on with SAML
- Configure SSO with PingIdentity as your SAML identity provider
- Configure SSO with Okta as your identity provider
- Configure SSO with Microsoft Azure AD or AD FS as your Identity Provider
- Configure SSO with OneLogin as your identity provider
- Configure SSO with Optimal as your identity provider
- Configure SSO in Computer Associates (CA) SiteMinder
- Secure SSO with TLS certificates
- Configuring SAML in a search head cluster
- Configure Ping Identity with leaf or intermediate SSL certificate chains
- Configure SAML SSO for other IdPs
- Configure advanced settings for SSO
- Map groups on a SAML identity provider to Splunk roles
- Modify or remove role mappings
- Configure SAML SSO in the configuration files
- Best practices for using SAML as an authentication scheme for single-sign on
- Troubleshoot SAML SSO
- About securing inter-Splunk communication
- Configure secure communications between Splunk instances with updated cipher suite and message authentication code
- Securing distributed search heads and peers
- Secure deployment servers and clients using certificate authentication
- Secure Splunk Enterprise services with pass4SymmKey
- Invalid token in Splunk app for SOAR, yet tokens a...
- Splunk Addon Builder Authentication Failed
- Creating Tokens in Splunk via GUI- How to troubles...
- Troubleshooting SplunkHecExporter in opentelemetry...
- BMC Remedy Add On Authentication errors
- splunk add-on for Box - authentication woes
- REST API Modular - trouble passing token header
- REST API Modular Input Integration with Octopus us...
- Authorization Token Not Work
- Azure eventhub input error with Splunk Add-on for ...
Troubleshoot token authentication
If a token fails authentication for any reason, Splunk Enterprise writes a message to splunkd.log
with additional information. As a Splunk administrator, you can read this log file to get information on why authentication with the token failed.
For additional information, you can enable debug logging. Splunk Enterprise writes information about token authentication using the JsonWebTokenHandler
tag. See Enable debug logging for instructions. After you have enabled debug logging, look for this tag when you review logs for information on problems that occur with token authentication.
Common problems for token authentication
Following are a list of common problems that can occur with token authentication.
Splunk instance displays "Token authentication is disabled"
If you receive this error message, either in Splunk Web or through a REST command, it means that you have not enabled token authentication.
- Confirm that you have completed the requirements for enabling token authentication.
- Enable token authentication.
cURL command returns "call not properly authenticated"
This message means that authentication to the Splunk platform instance with the token you presented was not successful.
- Confirm that the token is enabled. If it is not, and it has not yet expired, enable it if you have permission, or contact your administrator.
- Confirm that the token is valid and has not expired. If it has expired, create a new one if you have permission, or contact your administrator. You cannot extend token validity.
- Confirm that the "Not before" validity time for the token has passed. If it hasn't, either wait or create a new token if you have permission.
- Confirm that the token has not been deleted. If it has, create a new one if you have permission.
- Confirm that the account that is associated with the token exists. If it doesn't, create one, then create a new token and assign that user to the token, if you have permission.
- Confirm that you use the full token as it was generated. If you don't have the full token, request or create a new one, if you have permission.
- Confirm that you are using a token on the same Splunk platform instance where it was issued.
- If your Splunk platform instance uses an LDAP server for authentication, confirm that the user exists and is not disabled on LDAP server.
- If your Splunk instance uses an LDAP server for authentication, confirm that the instance can connect to the LDAP server.
Error received "KV store not ready"
This message means that app key value store (KV store) has not been enabled. Enable KV store if you have permission, or contact your administrator.
Use authentication tokens | Set up user authentication with LDAP |
This documentation applies to the following versions of Splunk® Enterprise: 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 7.3.9
Comments
You must be logged into splunk.com in order to post comments. Log in now.
Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.
Your Comment Has Been Posted Above
Feedback submitted, thanks!