CARVIEW |
Securing Splunk Enterprise
- Secure and protect your Splunk Enterprise deployment network
- Install Splunk Enterprise securely
- Create secure administrator credentials
- About TLS encryption and cipher suites
- Harden the Splunk Enterprise installation directory on Windows
- Secure Splunk Enterprise on your network
- Disable unnecessary Splunk Enterprise components
- Secure Splunk Enterprise service accounts
- Deploy secure passwords across multiple servers
- Harden the network port that App Key Value Store uses
- Use network access control lists to protect your deployment
- Use access control to secure Splunk data
- About user authentication
- About configuring role-based user access
- Define roles on the Splunk platform with capabilities
- Create and manage users with Splunk Web
- Create and manage roles with Splunk Web
- Find existing users and roles
- Secure access for Splunk knowledge objects
- Password best practices for administrators
- Configure Splunk password policies
- Configure a Splunk Enterprise password policy using the Authentication.conf configuration file
- Password best practices for users
- Unlock a user account
- Change a user password
- Manage out-of-sync passwords in a search head cluster
- Set up user authentication with LDAP
- Manage Splunk user roles with LDAP
- LDAP prerequisites and considerations
- Secure LDAP authentication with transport layer security (TLS) certificates
- How the Splunk platform works with multiple LDAP servers for authentication
- Configure LDAP with Splunk Web
- Map LDAP groups to Splunk roles in Splunk Web
- Configure single sign-on with SAML
- Configure SSO with PingIdentity as your SAML identity provider
- Configure SSO with Okta as your identity provider
- Configure SSO with Microsoft Azure AD or AD FS as your Identity Provider
- Configure SSO with OneLogin as your identity provider
- Configure SSO with Optimal as your identity provider
- Configure SSO in Computer Associates (CA) SiteMinder
- Secure SSO with TLS certificates on Splunk Enterprise
- Configure Ping Identity with leaf or intermediate SSL certificate chains
- Configure SAML SSO for other IdPs
- Configure authentication extensions to interface with your SAML identity provider
- Configure advanced settings for SSO
- Map groups on a SAML identity provider to Splunk roles
- Modify or remove role mappings
- Refresh expiring SAML identity provider certificates
- Troubleshoot SAML SSO
- About multifactor authentication with Duo Security
- Configure Splunk Enterprise to use Duo Security multifactor authentication
- Configure Duo multifactor authentication for Splunk Enterprise in the configuration file
- Migrate from the Duo Traditional Prompt to the Duo Universal Prompt
- About multifactor authentication with RSA Authentication Manager
- Configure RSA authentication from Splunk Web
- Configure Splunk Enterprise to use RSA Authentication Manager multifactor authentication via the REST endpoint
- Configure Splunk Enterprise to use RSA Authentication Manager multifactor authentication in the configuration file
- User experience when logging into a Splunk instance configured with RSA multifactor authentication
- Introduction to securing the Splunk platform with TLS
- Steps for securing your Splunk Enterprise deployment with TLS
- How to obtain certificates from a third-party for inter-Splunk communication
- How to obtain certificates from a third-party for Splunk Web
- How to create and sign your own TLS certificates
- How to prepare TLS certificates for use with the Splunk platform
- Configure Splunk indexing and forwarding to use TLS certificates
- Configure TLS certificates for inter-Splunk communication
- Configure Splunk Web to use TLS certificates
- Test and troubleshoot TLS connections
- Renew existing TLS certificates
- Configure TLS certificate host name validation for secured connections between Splunk software components
- Configure TLS protocol version support for secure connections between Splunk platform instances
- Configure and install certificates in Splunk Enterprise for Splunk Log Observer Connect
- Configure secure communications between Splunk instances with updated cipher suite and message authentication code
- Securing distributed search heads and peers
- Secure deployment servers and clients using certificate authentication
- Configure communication and bundle download authentication for deployment servers and clients
- Secure Splunk Enterprise services with pass4SymmKey
- Protect PII, PHI, and other sensitive data with field filters
- Plan for field filters in your organization
- Turn on Splunk platform field filters
- Create field filters using Splunk Web
- Optimize field filter performance using Splunk Web
- Exempt certain roles from field filters using Splunk Web
- Create field filters using configuration files
- Optimize field filter performance using configuration files
- Use field filters in searches
- Turn off Splunk platform field filters
Refresh expiring SAML identity provider certificates
When you configure the Splunk platform to use SAML as an authentication scheme, you can configure a certificate for your SAML identity provider. As with most security-related certificates, SAML IdP certificates expire after a period of time. When a certificate is due to expire, the Splunk platform notifies you of the upcoming expiration when you log into the Splunk platform instance.
If you don't replace your expiring IdP certificate with a new one, your Splunk Platform instance cannot connect to the IdP, and SAML logins fail. To prevent this problem, update your IdP certificate and replace it before the expiration date.
Upload a refreshed identity provider certificate to your Splunk platform instance
The general procedure for refreshing an IdP certificate on your Splunk platform instance follows. Depending on the IdP you use and whether you use a standalone certificate or certificate chain, the general procedure might differ slightly.
- Log into your SAML identity provider and visit its configuration page.
- In the configuration page for your IdP, generate a new IdP certificate or certificate chain
- Save the certificate or certificate chain as a file.
- Log into your Splunk platform instance and go to the SAML configuration page.
- On the SAML configuration page, upload the certificate or certificate chain.
- On the Settings > Authentication methods page, click "Reload authentication configuration."
Upload a standalone identity provider certificate to your Splunk platform instance
- On your IdP, generate new IdP metadata and download the metadata file or copy the metadata file contents.
- Log into your Splunk platform instance.
- From the system bar, select Settings > Authentication Methods.
- In the External section of the page that appears, select SAML.
- Select the Configure Splunk to use SAML link that appears.
- In the SAML configuration page, perform one of the following actions:
- Under Metadata XML file, select Select file, the choose the IdP metadata file that you just saved, or
- Under Metadata contents, paste the contents of the IdP metadata file you copied previously.
- Select Apply.
- Select Save to close the configuration page.
- In the Authentication Methods page, select Reload authentication configuration.
Upload an identity provider certificate chain to your Splunk platform instance
- On your IdP, generate the new IdP certificate.
- As necessary, arrange your IdP certificate chain as follows:
- Your certificate chain must be in the privacy-enhanced mail (PEM) format, with
-----BEGIN CERTIFICATE-----
and----END CERTIFICATE-----
around the text of each individual certificate. - You must arrange each certificate in the certificate chain as follows:
- Root certificate
- Any intermediate certificates
- Leaf certificate
- Your certificate chain must be in the privacy-enhanced mail (PEM) format, with
- Log into your Splunk platform instance.
- From the system bar, select Settings > Authentication Methods.
- In the External section of the page that appears, select SAML.
- Select the Configure Splunk to use SAML link that appears.
- In the SAML configuration page, under IdP certificate chains, paste the contents of the IdP certificate chain into the text field.
- Select Save to close the configuration page.
- In the Authentication Methods page, select Reload authentication configuration.
Upload a refreshed Splunk SAML certificate to your identity provider
On identity providers that require a SAML certificate for processing of Splunk Cloud Platform logins and logouts, you can refresh the SAML certificate that Splunk provides by uploading it to your IdP. Where you upload the SAML certificate to your IdP depends on the IdP that you use.
- As your Splunk Cloud Platform SAML certificate nears expiration, file a case with Splunk Support to have them generate a new certificate.
- After Splunk Support advises you that the new certificate is ready, download the service provider metadata file for your Splunk Cloud Platform instance by visiting the following URL:
https://<name of your Splunk Cloud Platform instance>.splunkcloud.com/en_US/saml/spmetadata
The name of your Splunk Cloud Platform instance appears in the welcome letter you received after you signed up for Splunk Cloud Platform. If you don't have this letter, contact Splunk Support and they can provide this information to you.
- After you download the SPMetadata.xml service provider metadata file, use a text editor to open this file.
- Search the file for the following tag:
<ds:X509Certificate>
- Select all of the text between that tag and the closing tag
</ds:X509Certificate>
later in the file. - Copy this selected text to your computer's clipboard.
- With the same text editor, open a new text file.
- Paste the information you copied between the previously-specified tags. This is the updated Splunk Cloud Platform SAML certificate that Splunk Support created for you.
- Insert the following string as the first line of the file:
-----BEGIN CERTIFICATE-----
. Confirm that there are no spaces between this line and the certificate text. - Insert the following string as the last line of the file:
-----END CERTIFICATE-----
. Confirm that there are no spaces between the certificate text and this line. - Save this file as a certificate file with a .pem extension. The filename must end in .pem, as .txt or any other extension is not acceptable.
- Log into your identity provider and access its configuration page.
- Upload the SCP SAML certificate to your IdP. The field or control that you use to upload the certificate depends on the IdP you use. For example, if you use Okta, you upload the certificate using the Signature Certificate upload control on the Okta configuration page.
- Where applicable, save your IdP configuration and exit the IdP configuration page.
Adjust the certificate expiration warning thresholds and notification intervals
You can control when the Splunk Platform notifies you of impending expiration of an identity provider certificate and how often you receive those expiration warnings. The following settings control these elements and you can use a REST API call to change them at any time:
curl -u <user>:<password> https://<hostname>:<management_port>/services/admin/SAML-auth/saml -d <setting=value> [-d <setting=value>]
The settings for controlling thresholds and intervals follow:
Setting name | Description | Default |
---|---|---|
idpCertExpirationWarningDays
|
The number of days before an identity provider certificate expires. During this period, when a SAML login occurs, the Splunk platform generates a certificate expiration warning log. | 90 |
IdPCertExpirationCheckInterval
|
How long a Splunk platform instance must wait, after generating a certificate expiration warning log after a login, to generate another one. You can specify this interval in <integer>[m|h|d], where m = minutes, h = hours, or d = days. | 1d |
Modify or remove role mappings | Troubleshoot SAML SSO |
This documentation applies to the following versions of Splunk® Enterprise: 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.1.4, 9.1.5, 9.1.6, 9.1.7, 9.1.8, 9.1.9, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.2.5, 9.2.6, 9.3.0, 9.3.1, 9.3.2, 9.3.3, 9.3.4, 9.4.0, 9.4.1, 9.4.2
Comments
You must be logged into splunk.com in order to post comments. Log in now.
Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.
Your Comment Has Been Posted Above
Feedback submitted, thanks!