Configure single sign-on with SAML
You can configure Splunk software to use SAML authentication for single sign-on (SSO), using information provided by your supported identity provider (IdP).
- A running version of Splunk software OR
- A managed deployment of Splunk Cloud. Self-service deployments of Splunk Cloud log in through the Splunk customer portal and cannot independently configure SAML SSO.
- An identity provider configured to provide the
- Ping Identity
- Azure AD
- AD FS
- CA siteminder
- An admin role (on-premise) or sc_admin role (cloud) with the change_authentication capability. This permission level lets you enable SAML and edit authentication settings on the Splunk search head.
Any SAML IdP that is v2 compliant should be configurable, including the following tested IdPs. For assistance with any IdP not documented in this chapter, contact Support:
- Novell Directory
- G Suite (Formerly Google Apps for Business)
Configure SAML to work with your IdP
Note: SAML does not support encryption, regardless of IdP.
1. Configure SAML SSO with:
Configure Duo two-factor authentication for Splunk Enterprise in the configuration file
Configure SSO with PingIdentity as your identity provider
This documentation applies to the following versions of Splunk® Enterprise: 6.5.0, 6.5.1, 6.5.1612 (Splunk Cloud only), 6.5.2, 6.5.3, 6.5.4, 6.5.5, 6.5.6, 6.5.7, 6.5.8, 6.6.0, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 6.6.6, 6.6.7, 7.0.0, 7.0.1, 7.0.2, 7.0.3