The following are the spec and example files for
# Version 6.4.9 # # This file contains possible attributes and values for configuring # authentication via authentication.conf. # # There is an authentication.conf in $SPLUNK_HOME/etc/system/default/. To # set custom configurations, place an authentication.conf in # $SPLUNK_HOME/etc/system/local/. For examples, see # authentication.conf.example. You must restart Splunk to enable # configurations. # # To learn more about configuration files (including precedence) please see # the documentation located at # http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles
# Use the [default] stanza to define any global settings. # * You can also define global settings outside of any stanza, at the top # of the file. # * Each conf file should have at most one default stanza. If there are # multiple default stanzas, attributes are combined. In the case of # multiple definitions of the same attribute, the last definition in the # file wins. # * If an attribute is defined at both the global level and in a specific # stanza, the value in the specific stanza takes precedence. [authentication] * Follow this stanza name with any number of the following attribute/value pairs. authType = [Splunk|LDAP|Scripted|SAML] * Specify which authentication system to use. * Supported values: Splunk, LDAP, Scripted, SAML. * Defaults to Splunk. authSettings = <authSettings-key>,<authSettings-key>,... * Key to look up the specific configurations of chosen authentication system. * <authSettings-key> is the name of a stanza header that specifies attributes for an LDAP strategy or for scripted authentication. Those stanzas are defined below. * For LDAP, specify the LDAP strategy name(s) here. If you want Splunk to query multiple LDAP servers, enter a comma-separated list of all strategies. Each strategy must be defined in its own stanza. The order in which you specify the strategy names will be the order Splunk uses to query their servers when looking for a user. * For scripted authentication, <authSettings-key> should be a single stanza name. passwordHashAlgorithm = [SHA512-crypt|SHA256-crypt|SHA512-crypt-<num_rounds>|SHA256-crypt-<num_rounds>|MD5-crypt] * For the default "Splunk" authType, this controls how hashed passwords are stored in the $SPLUNK_HOME/etc/passwd file. * "MD5-crypt" is an algorithm originally developed for FreeBSD in the early 1990's which became a widely used standard among UNIX machines. It was also used by Splunk up through the 5.0.x releases. MD5-crypt runs the salted password through a sequence of 1000 MD5 operations. * "SHA256-crypt" and "SHA512-crypt" are newer versions that use 5000 rounds of the SHA256 or SHA512 hash functions. This is slower than MD5-crypt and therefore more resistant to dictionary attacks. SHA512-crypt is used for system passwords on many versions of Linux. * These SHA-based algorithm can optionally be followed by a number of rounds to use. For example, "SHA512-crypt-10000" will use twice as many rounds of hashing as the default implementation. The number of rounds must be at least 1000. If you specify a very large number of rounds (i.e. more than 20x the default value of 5000), splunkd may become unresponsive and connections to splunkd (from splunkweb or CLI) will time out. * This setting only affects new password settings (either when a user is added or a user's password is changed) Existing passwords will continue to work but retain their previous hashing algorithm. * The default is "SHA512-crypt".
[<authSettings-key>] * Follow this stanza name with the attribute/value pairs listed below. * For multiple strategies, you will need to specify multiple instances of this stanza, each with its own stanza name and a separate set of attributes. * The <authSettings-key> must be one of the values listed in the authSettings attribute, specified above in the [authentication] stanza. host = <string> * REQUIRED * This is the hostname of LDAP server. * Be sure that your Splunk server can resolve the host name. SSLEnabled = [0|1] * OPTIONAL * Defaults to disabled (0) * See the file $SPLUNK_HOME/etc/openldap/openldap.conf for SSL LDAP settings port = <integer> * OPTIONAL * This is the port that Splunk should use to connect to your LDAP server. * Defaults to port 389 for non-SSL and port 636 for SSL bindDN = <string> * OPTIONAL, leave this blank to retrieve your LDAP entries using anonymous bind (must be supported by the LDAP server) * Distinguished name of the user that will be retrieving the LDAP entries * This user must have read access to all LDAP users and groups you wish to use in Splunk. bindDNpassword = <password> * OPTIONAL, leave this blank if anonymous bind is sufficient * Password for the bindDN user. userBaseDN = <string> * REQUIRED * This is the distinguished names of LDAP entries whose subtrees contain the users * Enter a ';' delimited list to search multiple trees. userBaseFilter = <string> * OPTIONAL * This is the LDAP search filter you wish to use when searching for users. * Highly recommended, especially when there are many entries in your LDAP user subtrees * When used properly, search filters can significantly speed up LDAP queries * Example that matches users in the IT or HR department: * userBaseFilter = (|(department=IT)(department=HR)) * See RFC 2254 for more detailed information on search filter syntax * This defaults to no filtering. userNameAttribute = <string> * REQUIRED * This is the user entry attribute whose value is the username. * NOTE: This attribute should use case insensitive matching for its values, and the values should not contain whitespace * Usernames are case insensitive in Splunk * In Active Directory, this is 'sAMAccountName' * A typical attribute for this is 'uid' realNameAttribute = <string> * REQUIRED * This is the user entry attribute whose value is their real name (human readable). * A typical attribute for this is 'cn' emailAttribute = <string> * OPTIONAL * This is the user entry attribute whose value is their email address. * Defaults to 'mail' groupMappingAttribute = <string> * OPTIONAL * This is the user entry attribute whose value is used by group entries to declare membership. * Groups are often mapped with user DN, so this defaults to 'dn' * Set this if groups are mapped using a different attribute * Usually only needed for OpenLDAP servers. * A typical attribute used to map users to groups is 'uid' * For example, assume a group declares that one of its members is 'splunkuser' * This implies that every user with 'uid' value 'splunkuser' will be mapped to that group groupBaseDN = [<string>;<string>;...] * REQUIRED * This is the distinguished names of LDAP entries whose subtrees contain the groups. * Enter a ';' delimited list to search multiple trees. * If your LDAP environment does not have group entries, there is a configuration that can treat each user as its own group * Set groupBaseDN to the same as userBaseDN, which means you will search for groups in the same place as users * Next, set the groupMemberAttribute and groupMappingAttribute to the same attribute as userNameAttribute * This means the entry, when treated as a group, will use the username value as its only member * For clarity, you should probably also set groupNameAttribute to the same value as userNameAttribute as well groupBaseFilter = <string> * OPTIONAL * The LDAP search filter Splunk uses when searching for static groups * Like userBaseFilter, this is highly recommended to speed up LDAP queries * See RFC 2254 for more information * This defaults to no filtering dynamicGroupFilter = <string> * OPTIONAL * The LDAP search filter Splunk uses when searching for dynamic groups * Only configure this if you intend to retrieve dynamic groups on your LDAP server * Example: '(objectclass=groupOfURLs)' dynamicMemberAttribute = <string> * OPTIONAL * Only configure this if you intend to retrieve dynamic groups on your LDAP server * This is REQUIRED if you want to retrieve dynamic groups * This attribute contains the LDAP URL needed to retrieve members dynamically * Example: 'memberURL' groupNameAttribute = <string> * REQUIRED * This is the group entry attribute whose value stores the group name. * A typical attribute for this is 'cn' (common name) * Recall that if you are configuring LDAP to treat user entries as their own group, user entries must have this attribute groupMemberAttribute = <string> * REQUIRED * This is the group entry attribute whose values are the groups members * Typical attributes for this are 'member' and 'memberUid' * For example, consider the groupMappingAttribute example above using groupMemberAttribute 'member' * To declare 'splunkuser' as a group member, its attribute 'member' must have the value 'splunkuser' nestedGroups = <bool> * OPTIONAL * Controls whether Splunk will expand nested groups using the 'memberof' extension. * Set to 1 if you have nested groups you want to expand and the 'memberof' * extension on your LDAP server. charset = <string> * OPTIONAL * ONLY set this for an LDAP setup that returns non-UTF-8 encoded data. LDAP is supposed to always return UTF-8 encoded data (See RFC 2251), but some tools incorrectly return other encodings. * Follows the same format as CHARSET in props.conf (see props.conf.spec) * An example value would be "latin-1" anonymous_referrals = <bool> * OPTIONAL * Set this to 0 to turn off referral chasing * Set this to 1 to turn on anonymous referral chasing * IMPORTANT: We only chase referrals using anonymous bind. We do NOT support rebinding using credentials. * If you do not need referral support, we recommend setting this to 0 * If you wish to make referrals work, set this to 1 and ensure your server allows anonymous searching * Defaults to 1 sizelimit = <integer> * OPTIONAL * Limits the amount of entries we request in LDAP search * IMPORTANT: The max entries returned is still subject to the maximum imposed by your LDAP server * Example: If you set this to 5000 and the server limits it to 1000, you'll still only get 1000 entries back * Defaults to 1000 timelimit = <integer> * OPTIONAL * Limits the amount of time in seconds we will wait for an LDAP search request to complete * If your searches finish quickly, you should lower this value from the default * Defaults to 15 network_timeout = <integer> * OPTIONAL * Limits the amount of time a socket will poll a connection without activity * This is useful for determining if your LDAP server cannot be reached * IMPORTANT: As a connection could be waiting for search results, this value must be higher than 'timelimit' * Like 'timelimit', if you have a fast connection to your LDAP server, we recommend lowering this value * Defaults to 20
[roleMap_<authSettings-key>] * The mapping of Splunk roles to LDAP groups for the LDAP strategy specified by <authSettings-key> * IMPORTANT: this role mapping ONLY applies to the specified strategy. * Follow this stanza name with several Role-to-Group(s) mappings as defined below. * Note: Importing groups for the same user from different strategies is not supported. <Splunk RoleName> = <LDAP group string> * Maps a Splunk role (from authorize.conf) to LDAP groups * This LDAP group list is semicolon delimited (no spaces). * List several of these attribute value pairs to map several Splunk roles to LDAP Groups
[<authSettings-key>] * Follow this stanza name with the following attribute/value pairs: scriptPath = <string> * REQUIRED * This is the full path to the script, including the path to the program that runs it (python) * For example: "$SPLUNK_HOME/bin/python" "$SPLUNK_HOME/etc/system/bin/$MY_SCRIPT" * Note: If a path contains spaces, it must be quoted. The example above handles the case where SPLUNK_HOME contains a space scriptSearchFilters = [1|0] * OPTIONAL - Only set this to 1 to call the script to add search filters. * 0 disables (default) [cacheTiming] * Use these settings to adjust how long Splunk will use the answers returned from script functions before calling them again. userLoginTTL = <time range string> * Timeout for the userLogin script function. * These return values are cached on a per-user basis. * The default is '0' (no caching) getUserInfoTTL = <time range string> * Timeout for the getUserInfo script function. * These return values are cached on a per-user basis. * The default is '10s' getUsersTTL = <time range string> * Timeout for the getUsers script function. * There is only one global getUsers cache (it is not tied to a specific user). * The default is '10s' * All timeouts can be expressed in seconds or as a search-like time range * Examples include '30' (30 seconds), '2mins' (2 minutes), '24h' (24 hours), etc. * You can opt to use no caching for a particular function by setting the value to '0' * Be aware that this can severely hinder performance as a result of heavy script invocation * Choosing the correct values for cache timing involves a tradeoff between new information latency and general performance * High values yield better performance from calling the script less, but introduces a latency in picking up changes * Low values will pick up changes in your external auth system more quickly, but may slow down performance due to increased script invocations
Settings for Splunk Authentication mode
[splunk_auth] * Settings for Splunk's internal authentication system. minPasswordLength = <positive integer> * Specifies the minimum permitted password length in characters when passwords are set or modified. * This setting is optional. * If 0, there is no required minimum. In other words there is no constraint. * Password modification attempts which do not meet this requirement will be * explicitly rejected. Defaults to 0 (disabled).
[<saml-authSettings-key>] * Follow this stanza name with the attribute/value pairs listed below. * The <authSettings-key> must be one of the values listed in the * authSettings attribute, specified above in the [authentication] stanza. fqdn = <string> * OPTIONAL * The fully qualified domain name where this splunk instance is running. * If this value is not specified, Splunk will default to the value specified in server.conf. * If this value is specified and 'http://' or 'https://' prefix is not present, splunk will use the ssl setting for splunkweb. * Splunk will use this information to populate the 'assertionConsumerServiceUrl'. redirectPort = <port number> * OPTIONAL * The port where SAML responses will be sent. Typically, this is the web port. * If internal port redirection is needed, set this port and the 'assertionconsumerServiceUrl' in the AuthNRequest will contain this port instead of the splunkweb port. * To prevent any port information to be appended in the 'assertionConsumerServiceUrl' attribute, set this to 0. idpSSOUrl = <url> * REQUIRED * The protocol endpoint on the IDP (Identity Provider) where the AuthNRequests should be sent. * SAML requests will fail if this information is missing. idpAttributeQueryUrl = <url> * REQUIRED * The protocol endpoint on the IDP (Identity Provider) where the attribute query requests should be sent. * Attribute query requests are required for scheduled searches. * Splunk will not be able to get role information if this is absent. idpCertPath = <Pathname> * REQUIRED * This value is relative to $SPLUNK_HOME/etc/auth/idpCerts. * If IDP (Identitiy Provider), is configured to use a single certificate, for signing SAML assertion, then its value is relative path including certificate name. * If IDP is configured with multiple certificates, and it can choose any one of them for assertion signing, then its value is relative path to the directory containing these certs. * Assertions from the IDP will be verified using this/these certificate/certificates. idpSLOUrl = = <url> * OPTIONAL * The protocol endpoint on the IDP (Identity Provider) where a SP (Service Provider) initiated Single logout request should be sent. errorUrl = <url> * OPTIONAL * The url to be displayed for a SAML error. Errors may be due to erroneous or incomplete configuration in either the IDP or Splunk. This url can be absolute or relative. Absolute url can be a complete url , e.g. https://www.external-site.com. Relative urls starting with '/' will show up as internal link of splunk instance, e.g. https://splunkhost:port/relativeUrlWithSlash , while those not starting with '/' will show up as https://splunkhost:port/en-US/account/relativeUrlWithNoSlash errorUrlLabel = <url> * OPTIONAL * Label or title of the content pointed to by errorUrl. entityId = <string> * REQUIRED * The entity id for SP connection as configured on the IDP. signAuthnRequest = [ true | false ] * OPTIONAL * This tells Splunk whether to sign AuthNRequests. * Defaults to true. signedAssertion = [true|false] * OPTIONAL * This tells Splunk if the SAML assertion has been signed by the IDP * If set to false, Splunk will not verify the signature of the assertion using the certificate of the IDP. * Currently, we accept only signed assertions. * Defaults to true. attributeQuerySoapPassword = <password> * REQUIRED * Attribute query requests are made using SOAP using basic authentication * The password to be used when making an attribute query request. * This string will obfuscated upon splunkd startup. attributeQuerySoapUsername = <string> * REQUIRED * Attribute Query requests are made using SOAP using basic authentication * The username to be used when making an attribute query request. attributeQueryRequestSigned = [ true | false ] * OPTIONAL * Specifies whether to sign attribute query requests. * Defaults to true attributeQueryResponseSigned = [ true | false ] * OPTIONAL * Specifies whether attribute query responses are signed. * If set to false, Splunk will not verify the signature in the response using the certificate of the IDP. * Defaults to true. redirectAfterLogoutToUrl = <url> * OPTIONAL * The user will be redirected to this url after logging out of Splunk. * If this is not specified and a idpSLO is also missing, the user will be redirected to splunk.com after logout. defaultRoleIfMissing = <splunk role> * OPTIONAL * If the IDP does not return any AD groups or splunk roles as a part of the assertion, we will use this value if provided. skipAttributeQueryRequestForUsers = <comma separated list of users> * OPTIONAL * To skip attribute query requests being sent to the IDP for certain users, add them here. * By default, attribute query requests will be skipped for local users. * For non-local users, use this in conjunction with 'defaultRoleIfMissing'. maxAttributeQueryThreads = <int> * OPTIONAL * Defaults to 2, max is 10 * Number of threads to use to make attribute query requests. * Changes to this will require a restart to take effect. maxAttributeQueryQueueSize = <int> * OPTIONAL * Defaults to 50 * The number of attribute query requests to queue, set to 0 for infinite size. * Changes to this will require a restart to take effect. attributeQueryTTL = <ttl in seconds> * OPTIONAL * Determines the time for which Splunk will cache the user and role information. * Once the ttl expires, Splunk will make an attribute query request to retrieve the role information. * Default ttl if not specified, is 3600 seconds. allowSslCompression = [ true | false ] * OPTIONAL * If set to true, the server will allow clients to negotiate SSL-layer data compression. * If not set, defaults to the setting in server.conf. cipherSuite = <cipher suite string> * OPTIONAL * If set, Splunk uses the specified cipher string for the HTTP server. * If not set, defaults to the setting in server.conf. * Attribute query requests might fail if the IDP requires a relaxed ciphersuite. * Use "openssl s_client -cipher 'TLSv1+HIGH:@STRENGTH' -host <IDP host> -port 443" to determine if splunk can connect to the IDP sslVersions = <versions_list> * OPTIONAL * Comma-separated list of SSL versions to support. * The versions available are "ssl3", "tls1.0", "tls1.1", and "tls1.2" * If not set, defaults to the setting in server.conf. sslCommonNameToCheck = <commonName> * OPTIONAL * If this value is set, and 'sslVerifyServerCert' is set to true, splunkd will limit most outbound HTTPS connections to hosts which use a cert with this common name. * If not set, Splunk uses the setting specified in server.conf. sslAltNameToCheck = <alternateName1>, <alternateName2>, ... * OPTIONAL * If this value is set, and 'sslVerifyServerCert' is set to true, splunkd will also be willing to verify certificates which have a so-called "Subject Alternate Name" that matches any of the alternate names in this list. * If not set, Splunk uses the setting specified in server.conf. ecdhCurveName = <string> * OPTIONAL * DEPRECATED - Use 'ecdhCurves' to specify one ore more ec curves instead. * ECDH curve to use for ECDH key negotiation * If not set, Splunk uses the setting specified in server.conf. ecdhCurves = <comma separated list of ec curves> * ECDH curves to use for ECDH key negotiation. * The curves should be specified in the order of preference. * The client sends these curves as a part of Client Hello. * The server supports only the curves specified in the list. * We only support named curves specified by their SHORT names. (see struct ASN1_OBJECT in asn1.h) * The list of valid named curves by their short/long names can be obtained by executing this command: $SPLUNK_HOME/bin/splunk cmd openssl ecparam -list_curves * Default is empty string. * e.g. ecdhCurves = prime256v1,secp384r1,secp521r1 sslKeysfile = <filename> * OPTIONAL * Server certificate file. * Certificates are auto-generated by splunkd upon starting Splunk. * You may replace the default cert with your own PEM format file. * Default is server.pem. * If not set, Splunk uses the setting specified in server.conf. sslKeysfilePassword = <password> * OPTIONAL * Server certificate password. * Default is password. * If not set, Splunk uses the setting specified in server.conf. caCertFile = <filename> * OPTIONAL * Public key of the signing authority. * Default is cacert.pem. * If not set, Splunk uses the setting specified in server.conf. caPath = <path> * OPTIONAL * Path where all these certs are stored. * Default is $SPLUNK_HOME/etc/auth. sslVerifyServerCert = [ true | false ] * OPTIONAL * Used by distributed search: when making a search request to another server in the search cluster. * If not set, Splunk uses the setting specified in server.conf. blacklistedAutoMappedRoles = <comma separated list of roles> * OPTIONAL * Comma separated list of splunk roles that should be blacklisted from being auto-mapped by splunk from the IDP Response. blacklistedUsers = <comma separated list of user names> * OPTIONAL * Comma separated list of user names from the IDP response to be blacklisted by splunk platform. nameIdFormat = <string> * OPTIONAL * If supported by IDP, while making SAML Authentication request this value can be used to specify the format of the Subject returned in SAML Assertion.
[roleMap_<saml-authSettings-key>] * The mapping of Splunk roles to SAML groups for the SAML stanza specified by <authSettings-key> * If a SAML group is not explicitly mapped to a Splunk role, but has same name as a valid Splunk role then for ease of configuration, it is auto-mapped to that Splunk role. * Follow this stanza name with several Role-to-Group(s) mappings as defined below. <Splunk RoleName> = <SAML group string> * Maps a Splunk role (from authorize.conf) to SAML groups * This SAML group list is semicolon delimited (no spaces). * List several of these attribute value pairs to map several Splunk roles to SAML Groups. * If role mapping is not specified, Splunk expects Splunk roles in the assertion and attribute query response returned from the IDP.
SAML User Roles Map
[userToRoleMap_<saml-authSettings-key>] * The mapping of SAML user to Splunk roles for the SAML stanza specified by <authSettings-key> * Follow this stanza name with several User-to-Role(s) mappings as defined below. * The stanza is used only when the IDP does not support Attribute Query Request <SAML User> = <Splunk Roles string> * Maps a SAML user to Splunk role (from authorize.conf) * This Splunk Role list is semicolon delimited (no spaces).
Authentication Response Attribute Map
[authenticationResponseAttrMap_SAML] * Splunk expects email, real name and roles to be returned as SAML Attributes in SAML assertion. This stanza can be used to map attribute names to what Splunk expects. These are optional settings and are only needed for certain IDPs. role = <string> * OPTIONAL * Attribute name to be used as role in SAML Assertion. * Default is "role" realName = <string> * OPTIONAL * Attribute name to be used as realName in SAML Assertion. * Default is "realName" mail = <string> * OPTIONAL * Attribute name to be used as email in SAML Assertion. * Default is "mail"
[secrets] disabled = <bool> * Toggles integration with platform-provided secret storage facilities. * Defaults to false if Common Criteria mode is enabled. * Defaults to true if Common Criteria mode is disabled. * NOTE: Splunk plans to submit Splunk Enterprise for Common Criteria evaluation. Splunk does not support using the product in Common Criteria mode until it has been certified by NIAP. See the "Securing Splunk Enterprise" manual for information on the status of Common Criteria certification. filename = <filename> * Designates a Python script that integrates with platform-provided secret storage facilities, like the GNOME keyring. * <filename> should be the name of a Python script located in one of the following directories: $SPLUNK_HOME/etc/apps/*/bin $SPLUNK_HOME/etc/system/bin $SPLUNK_HOME/etc/searchscripts * <filename> should be a pure basename; it should contain no path separators. * <filename> should end with a .py file extension. namespace = <string> * Use an instance-specific string as a namespace within secret storage. * When using the GNOME keyring, this namespace is used as a keyring name. * If multiple Splunk instances must store separate sets of secrets within the same storage backend, this value should be customized to be unique for each Splunk instance. * Defaults to "splunk".
# Version 6.4.9 # # This is an example authentication.conf. authentication.conf is used to # configure LDAP and Scripted authentication in addition to Splunk's native # authentication. # # To use one of these configurations, copy the configuration block into # authentication.conf in $SPLUNK_HOME/etc/system/local/. You must reload # auth in manager or restart Splunk to enable configurations. # # To learn more about configuration files (including precedence) please see # the documentation located at # http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles ##### Use just Splunk's built-in authentication (default): [authentication] authType = Splunk ##### LDAP examples #### Basic LDAP configuration example [authentication] authType = LDAP authSettings = ldaphost [ldaphost] host = ldaphost.domain.com port = 389 SSLEnabled = 0 bindDN = cn=Directory Manager bindDNpassword = password userBaseDN = ou=People,dc=splunk,dc=com userBaseFilter = (objectclass=splunkusers) groupBaseDN = ou=Groups,dc=splunk,dc=com groupBaseFilter = (objectclass=splunkgroups) userNameAttribute = uid realNameAttribute = givenName groupMappingAttribute = dn groupMemberAttribute = uniqueMember groupNameAttribute = cn timelimit = 10 network_timeout = 15 # This stanza maps roles you have created in authorize.conf to LDAP Groups [roleMap_ldaphost] admin = SplunkAdmins #### Example using the same server as 'ldaphost', but treating each user as #### their own group [authentication] authType = LDAP authSettings = ldaphost_usergroups [ldaphost_usergroups] host = ldaphost.domain.com port = 389 SSLEnabled = 0 bindDN = cn=Directory Manager bindDNpassword = password userBaseDN = ou=People,dc=splunk,dc=com userBaseFilter = (objectclass=splunkusers) groupBaseDN = ou=People,dc=splunk,dc=com groupBaseFilter = (objectclass=splunkusers) userNameAttribute = uid realNameAttribute = givenName groupMappingAttribute = uid groupMemberAttribute = uid groupNameAttribute = uid timelimit = 10 network_timeout = 15 [roleMap_ldaphost_usergroups] admin = admin_user1;admin_user2;admin_user3;admin_user4 power = power_user1;power_user2 user = user1;user2;user3 #### Sample Configuration for Active Directory (AD) [authentication] authSettings = AD authType = LDAP [AD] SSLEnabled = 1 bindDN = firstname.lastname@example.org bindDNpassword = ldap_bind_user_password groupBaseDN = CN=Groups,DC=splunksupport,DC=kom groupBaseFilter = groupMappingAttribute = dn groupMemberAttribute = member groupNameAttribute = cn host = ADbogus.splunksupport.kom port = 636 realNameAttribute = cn userBaseDN = CN=Users,DC=splunksupport,DC=kom userBaseFilter = userNameAttribute = sAMAccountName timelimit = 15 network_timeout = 20 anonymous_referrals = 0 [roleMap_AD] admin = SplunkAdmins power = SplunkPowerUsers user = SplunkUsers #### Sample Configuration for Sun LDAP Server [authentication] authSettings = SunLDAP authType = LDAP [SunLDAP] SSLEnabled = 0 bindDN = cn=Directory Manager bindDNpassword = Directory_Manager_Password groupBaseDN = ou=Groups,dc=splunksupport,dc=com groupBaseFilter = groupMappingAttribute = dn groupMemberAttribute = uniqueMember groupNameAttribute = cn host = ldapbogus.splunksupport.com port = 389 realNameAttribute = givenName userBaseDN = ou=People,dc=splunksupport,dc=com userBaseFilter = userNameAttribute = uid timelimit = 5 network_timeout = 8 [roleMap_SunLDAP] admin = SplunkAdmins power = SplunkPowerUsers user = SplunkUsers #### Sample Configuration for OpenLDAP [authentication] authSettings = OpenLDAP authType = LDAP [OpenLDAP] bindDN = uid=directory_bind,cn=users,dc=osx,dc=company,dc=com bindDNpassword = directory_bind_account_password groupBaseFilter = groupNameAttribute = cn SSLEnabled = 0 port = 389 userBaseDN = cn=users,dc=osx,dc=company,dc=com host = hostname_OR_IP userBaseFilter = userNameAttribute = uid groupMappingAttribute = uid groupBaseDN = dc=osx,dc=company,dc=com groupMemberAttribute = memberUid realNameAttribute = cn timelimit = 5 network_timeout = 8 dynamicGroupFilter = (objectclass=groupOfURLs) dynamicMemberAttribute = memberURL nestedGroups = 1 [roleMap_OpenLDAP] admin = SplunkAdmins power = SplunkPowerUsers user = SplunkUsers ##### Scripted Auth examples #### The following example is for RADIUS authentication: [authentication] authType = Scripted authSettings = script [script] scriptPath = "$SPLUNK_HOME/bin/python" "$SPLUNK_HOME/share/splunk/authScriptSamples/radiusScripted.py" # Cache results for 1 second per call [cacheTiming] userLoginTTL = 1 getUserInfoTTL = 1 getUsersTTL = 1 #### The following example works with PAM authentication: [authentication] authType = Scripted authSettings = script [script] scriptPath = "$SPLUNK_HOME/bin/python" "$SPLUNK_HOME/share/splunk/authScriptSamples/pamScripted.py" # Cache results for different times per function [cacheTiming] userLoginTTL = 30s getUserInfoTTL = 1min getUsersTTL = 5mins ##### SAML auth example [authentication] authSettings = samlv2 authType = SAML [samlv2] attributeQuerySoapPassword = changeme attributeQuerySoapUsername = test entityId = test-splunk idpAttributeQueryUrl = https://exsso/idp/attrsvc.ssaml2 idpCertPath = /home/splunk/etc/auth/idp.crt idpSSOUrl = https://exsso/idp/SSO.saml2 idpSLOUrl = https://exsso/idp/SLO.saml2 signAuthnRequest = true signedAssertion = true attributeQueryRequestSigned = true attributeQueryResponseSigned = true redirectPort = 9332 cipherSuite = TLSv1 MEDIUM:@STRENGTH nameIdFormat = urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress [roleMap_SAML] admin = SplunkAdmins power = SplunkPowerUsers user = all [userToRoleMap_SAML] samluser = user [authenticationResponseAttrMap_SAML] role = "http://schemas.microsoft.com/ws/2008/06/identity/claims/groups" mail = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" realName = "http://schemas.microsoft.com/identity/claims/displayname"
This documentation applies to the following versions of Splunk® Enterprise: 6.4.9