CARVIEW |
Securing Splunk Enterprise
- Secure and protect your Splunk Enterprise deployment network
- Install Splunk Enterprise securely
- Create secure administrator credentials
- About TLS encryption and cipher suites
- Harden the Splunk Enterprise installation directory on Windows
- Secure Splunk Enterprise on your network
- Disable unnecessary Splunk Enterprise components
- Secure Splunk Enterprise service accounts
- Deploy secure passwords across multiple servers
- Harden the network port that App Key Value Store uses
- Use network access control lists to protect your deployment
- Use access control to secure Splunk data
- About user authentication
- About configuring role-based user access
- Define roles on the Splunk platform with capabilities
- Create and manage users with Splunk Web
- Create and manage roles with Splunk Web
- Find existing users and roles
- Secure access for Splunk knowledge objects
- Password best practices for administrators
- Configure Splunk password policies
- Configure a Splunk Enterprise password policy using the Authentication.conf configuration file
- Password best practices for users
- Unlock a user account
- Change a user password
- Manage out-of-sync passwords in a search head cluster
- Set up user authentication with LDAP
- Manage Splunk user roles with LDAP
- LDAP prerequisites and considerations
- Secure LDAP authentication with transport layer security (TLS) certificates
- How the Splunk platform works with multiple LDAP servers for authentication
- Configure LDAP with Splunk Web
- Map LDAP groups to Splunk roles in Splunk Web
- Configure single sign-on with SAML
- Configure SSO with PingIdentity as your SAML identity provider
- Configure SSO with Okta as your identity provider
- Configure SSO with Microsoft Azure AD or AD FS as your Identity Provider
- Configure SSO with OneLogin as your identity provider
- Configure SSO with Optimal as your identity provider
- Configure SSO in Computer Associates (CA) SiteMinder
- Secure SSO with TLS certificates on Splunk Enterprise
- Configure Ping Identity with leaf or intermediate SSL certificate chains
- Configure SAML SSO for other IdPs
- Configure authentication extensions to interface with your SAML identity provider
- Configure advanced settings for SSO
- Map groups on a SAML identity provider to Splunk roles
- Modify or remove role mappings
- Refresh expiring SAML identity provider certificates
- Troubleshoot SAML SSO
- About multifactor authentication with Duo Security
- Configure Splunk Enterprise to use Duo Security multifactor authentication
- Configure Duo multifactor authentication for Splunk Enterprise in the configuration file
- Migrate from the Duo Traditional Prompt to the Duo Universal Prompt
- About multifactor authentication with RSA Authentication Manager
- Configure RSA authentication from Splunk Web
- Configure Splunk Enterprise to use RSA Authentication Manager multifactor authentication via the REST endpoint
- Configure Splunk Enterprise to use RSA Authentication Manager multifactor authentication in the configuration file
- User experience when logging into a Splunk instance configured with RSA multifactor authentication
- Introduction to securing the Splunk platform with TLS
- Steps for securing your Splunk Enterprise deployment with TLS
- How to obtain certificates from a third-party for inter-Splunk communication
- How to obtain certificates from a third-party for Splunk Web
- How to create and sign your own TLS certificates
- How to prepare TLS certificates for use with the Splunk platform
- Configure Splunk indexing and forwarding to use TLS certificates
- Configure TLS certificates for inter-Splunk communication
- Configure Splunk Web to use TLS certificates
- Test and troubleshoot TLS connections
- Renew existing TLS certificates
- Configure TLS certificate host name validation for secured connections between Splunk software components
- Configure TLS protocol version support for secure connections between Splunk platform instances
- Configure and install certificates in Splunk Enterprise for Splunk Log Observer Connect
- Configure secure communications between Splunk instances with updated cipher suite and message authentication code
- Securing distributed search heads and peers
- Secure deployment servers and clients using certificate authentication
- Configure communication and bundle download authentication for deployment servers and clients
- Secure Splunk Enterprise services with pass4SymmKey
- Protect PII, PHI, and other sensitive data with field filters
- Plan for field filters in your organization
- Turn on Splunk platform field filters
- Create field filters using Splunk Web
- Optimize field filter performance using Splunk Web
- Exempt certain roles from field filters using Splunk Web
- Create field filters using configuration files
- Optimize field filter performance using configuration files
- Use field filters in searches
- Turn off Splunk platform field filters
- How to modify my configuration of Splunk SSO with ...
- Is there step by step documentation for configurin...
- No valid Splunk role found in local mapping - Micr...
- Azure AD SAML Group Claims
- Can I get an overview of how Splunk permissions wo...
- Regarding the API key for configuring the authenti...
- Using Auth0 for SAML
- Does Splunk support 2 factor or RSA authentication...
- (Native) Splunk APP on WIndows Azure AD - Can't ma...
- SAML Support on Search head Clusters
Configure SSO with Okta as your identity provider
If you use Okta as your Identity Provider (IdP), follow these instructions to configure the Splunk platform for single sign-on.
After you configure the Splunk platform for SSO, you can map groups from the IdP to those roles so that users can log in. See Map groups on a SAML identity provider to Splunk user roles so that users in those groups can log in.
To configure the Splunk platform to also delete its users when you delete users on the IdP, follow the procedure at "Configure the Splunk platform to remove users on Okta" later in this topic.
For information about configuring Okta as an IdP, consult the Okta documentation.
- Confirm that your system meets all of the requirements. See Configure single sign-on with SAML.
- In the Settings menu, select Authentication methods.
- Select SAML as your authentication type.
- Click Configure Splunk to use SAML.
- On the SAML Groups page, click SAML Configuration.
- Download or browse and select your metadata file, or copy and paste your metadata directly into the text window. Refer to your Okta documentation if you are not sure how to locate your metadata file.
- In General Settings, provide the following information:
Single Sign on URL. This field is populated automatically by your selected metadata file. It is the protected endpoint on your IdP to which Splunk Enterprise sends authentication requests. To access the login page once SAML is enabled, append the full login URL (
/saml/acs
) withloginType=Splunk
. Users can also log into their local Splunk account by navigating directly to – splunkweb:port/en-US/account/login?loginType=SplunkSingle Log Out URL. This field is populated automatically by the metadata file and is the IdP protocol endpoint. If you do not provide this URL, the user will not be logged out. IdP's certificate path This value can be a directory or a single file, depending on your IdP requirements. If you provide a file, Splunk Enterprise uses that file to validate authenticity of SAML response. If you provide a directory, Splunk Enterprise looks at all the certificates in the directory and tries to validate SAML response with each one of them. If any validation fails, authentication fails. IdP certificate chains If you use a certificate chain, order them as follows: 1. Root
2. Intermediate
3. Leaf
Replicate certificates Check this to replicate your IdP certificates in a search head cluster. When configuring SAML on a search head cluster, you must use the same certificate for each search head. Issuer Id This is the Entity Id of the IdP. See your IdP documentation if you are not sure where to find this information. Entity ID. This field is the entity ID as configured in the SP connection entry in your IdP. Sign AuthRequest. Select this option. Sign SAML Response. Select this option. If '''Request Compression''' is set, when you log onto Splunk Web on a Search Head, you are diverted to Okta Applications rather than the Search Head.
- Skip Attribute Query.
- In the Alias section optionally provide the following aliasing information:
In Alias, provide the following information:
Role Alias Use this field to specify a new attribute name on any IdP and then configure an alias in your Splunk deployment for any of the three attributes. Real Name Alias You may skip this field. For ADFS you can use the displayname for the Attribute Alias Real Name. Mail Alias Skip this field.
- Populate the advanced section only if you need to set up load balancing or change the SAML binding. See Configure load balancing or SAML bindings.
- Click Save
An error in configuring SAML can result in users and admins being locked out of the Splunk platform. Use the following URL to access the local login and revert to native authentication if the instance locks you out:
https://<accountname>.splunkcloud.com/en-US/account/login?loginType=splunk
Configure the Splunk platform to remove users on Okta
By default, the Splunk platform does not automatically keep users in sync with Okta. It does not remove users on the Splunk side that no longer exist on the IdP. With system for cross-domain identity management (SCIM), you can configure the Splunk platform to sync user deletions from the IdP.
This procedure requires coordination with the administrator of your IdP. Before you can use SCIM for automated user management with SAML, your IdP administrator must turn on SCIM in the SAML application on the IdP. Then you must configure the Splunk platform with information that your IdP administrator provides.
Some Okta SAML applications might not support SCIM. Consult with your Okta IdP administrator or Okta for a better understanding of which Okta SAML applications support the SCIM process. If the Okta SAML application does not support SCIM, then the Splunk platform cannot use the application to perform local user account removal.
After you configure SCIM, the Splunk platform deletes its users after you delete them from the IdP. Depending on the authentication type that your IdP administrator uses for SCIM, delete operations can take up to one hour to process.
- Provide the IdP administrator with the URL of the SCIM client. In general, the URL has the following format:
https://<splunk-server>/en-US/splunkd/__raw/services/identity/provisioning/v1/scim/v2
- The IdP administrator must enable SCIM in the SAML application that the Splunk platform uses for authentication. They use the SCIM client URL that you give them as part of this process. They have three options to perform authentication requests through SCIM:
- Splunk authentication, using a Splunk username and password.
- HTTP header authentication, using a Bearer authorization token.
- Open Authorization (OAuth) v2.0, using the access token endpoint and authorization endpoint URIs, a client ID, and a client secret.
- If the IdP administrator uses OAuth 2.0 to process SCIM requests, they will provide you with the Issuer URL and the Client ID.
- Log into the Splunk platform instance where you want to enable SCIM.
- From the system bar, select Settings > Authentication Methods.
- Select SAML settings.
- Select SAML Configuration.
- Select the triangle next to Automated User Management. Options for automated user management appear.
- Select Enable SCIM and confirm that the box is checked.
- (Optional) If the IdP administrator provided you with the Issuer URL and Client ID for OAuth 2.0, enter the values into the OAuth Issuer URL and OAuth Client ID fields, respectively.
- (Optional) If necessary, complete the SAML configuration settings for the Splunk platform by updating fields for your specific authentication application.
- Select Save. The update takes effect immediately.
Next steps
Configure SSO with PingIdentity as your SAML identity provider | Configure SSO with Microsoft Azure AD or AD FS as your Identity Provider |
This documentation applies to the following versions of Splunk® Enterprise: 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.2.5, 9.2.6, 9.3.0, 9.3.1, 9.3.2, 9.3.3, 9.3.4, 9.4.0, 9.4.1, 9.4.2
Comments
Configure SSO with Okta as your identity provider
You must be logged into splunk.com in order to post comments. Log in now.
Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.
Your Comment Has Been Posted Above
Feedback submitted, thanks!