Configure Single Sign-On with reverse proxy
Before you configure reverse proxy-based SSO with Splunk Enterprise, make sure you have the following:
- A Proxy Server (Splunk Enterprise supports IIS or Apache) configured as a reverse proxy to authenticate to external systems.
- An LDAP Server or other external authentication system provisioned with appropriate groups and users for your proxy to authenticate against.
- A working Splunk Enterprise configuration that is either configured to use the same external authentication system as your proxy (usually LDAP) or that has native Splunk Enterprise users that match the user and group IDs contained in your external authentication system.
Configuring SSO with reverse proxy requires the following steps:
1. Edit the properties on your proxy server to authenticate against your external authentication system.
2. Edit the Splunk Enterprise
3. Edit the Splunk Enterprise
Note: For optimal security, any HTTP header-based solutions should be implemented over a TLS/SSL enabled deployment.
trustedIP in the
general settings stanza to add the IP address that will make secure authentication requests to splunkd. This is typically Splunk Web and therefore the localhost. You can only enter one IP address per splunkd instance.
If no IP addresses are provided in the
trustedIP list, Splunk SSO is disabled by default.
To enable SSO, configure the following in the
[settings] stanza in
SSOMode = strict trustedIP = 127.0.0.1,10.3.1.61,10.1.8.81 remoteUser = Remote-User tools.proxy.on = False
Strict mode restricts authentication to identities that match the IP addresses listed in
Permissive mode also restricts authentication to requests from IPs found in the
||n/a||Set this to the IP address of the authenticating proxy or proxies. Specify a single address or a comma-separated list of addresses; IP ranges and netmask notation are not supported.|
The default Splunk header used is
||false||For apache 1.x proxy this value shoud be set to True. For later versions this value should be set to False.|
If you host Splunk Web behind a proxy that does not place Splunk Web at the proxy's root, you may also need to configure the
root_endpoint setting in
For example if your proxy hosts Splunk Web at "yourhost.com:9000/splunk",
root_endpoint should be set to
You would next make it visible to the proxy by mapping it in
ProxyPass /lzone http://splunkweb.splunk.com:8000/lzone ProxyPassReverse /lzone http://splunkweb.splunk.com:8000/lzone
Since there is no simple log out for a session and Splunk Enterprise will preserve a session as long as the correct header information is contained in the proxy header, you should set your proxy's session timeout value with this in mind.
If you need to end a session before the timeout has occurred, you can use the REST end point along with the session identifier to destroy the session:
curl -s -uadmin:changeme -k -X DELETE https://localhost:8089/services/authentication/httpauth-tokens/990cb3e61414376554a39e390471fff0
About Single Sign-On using reverse proxy
Troubleshoot reverse-proxy SSO
This documentation applies to the following versions of Splunk® Enterprise: 6.5.0, 6.5.1, 6.5.2, 6.5.3, 6.5.4, 6.5.5, 6.5.6, 6.5.7, 6.5.8, 6.5.9, 6.5.10, 6.6.0, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 6.6.6, 6.6.7, 6.6.8, 6.6.9, 6.6.10, 6.6.11, 6.6.12, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.10, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.2.10, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 7.3.9, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5, 8.1.6, 8.1.7, 8.2.0, 8.2.1, 8.2.2, 8.2.3