Splunk Cloud Platform

Securing Splunk Cloud Platform

Secure LDAP authentication with transport layer security (TLS) certificates

The Splunk platform uses both OpenLDAP and OpenSSL. You can secure your LDAP authentication with certificates by changing the configuration on your LDAP server.

The following examples are certificate configurations for LDAP. For more information on how you can configure certificates in LDAP, see the OpenLDAP documentation.

For more information on creating and managing certificates, see the OpenSSL documentation.

LDAP server configuration

To secure LDAP server authentications, use the following LDAP settings on your server:

Setting Description
TLSCACertificateFile <filename> The Privacy Enhanced Mail (PEM)-format file that contains certificates for the CAs that the LDAP server daemon is to trust, including the certificate for the CA that signed the server certificate. You can append multiple certificates to the file in no particular order.
TLSCertificateKeyFile <filename> The file that contains the private key that matches the certificate stored in the TLSCertificateFile file.
TLSCipherSuite <cipher-suite-spec> Ciphers will be accepted and the preference order. <cipher-suite-spec> must be a cipher specification for OpenSSL. Use "openssl ciphers -v ALL" for a list of available cipher specifications.
TLSRandFile <filename> the file to obtain random bits from when the /dev/urandom file is not available. If the system provides the /dev/urandom file, then this option is not needed, otherwise you must configure a source of random data.
TLSEphemeralDHParamFile <filename> the file that contains parameters for Diffie-Hellman ephemeral key exchange.
TLSVerifyClient [never | allow | try | demand] Specifies the checks to perform on client certificates in an incoming TLS session, if any. This option is set to never by default, in which case the server never asks the client for a certificate.

LDAP client configuration

This directive specifies the file that contains the client certificate. This is a user-only directive. You can only specify the directive in an .ldaprc configuration file.

If you host two or more LDAP servers, you might not want to use self-signed certificates, since each client has to be configured to work with each certificate. In that case, it is easier to create a certificate authority to sign your server certificates.

Setting Description
TLS_KEY <filename> Specifies the file that contains the private key that matches the certificate stored in the TLS_CERT file. The same constraints mentioned for TLSCertificateKeyFile apply here. This is also a user-only directive.
TLS_RANDFILE <filename> The same as the server TLSRandFile setting.
TLS_REQCERT [ never | allow | try | demand ]
Last modified on 27 October, 2021
LDAP prerequisites and considerations   How the Splunk platform works with multiple LDAP servers for authentication

This documentation applies to the following versions of Splunk Cloud Platform: 8.2.2112, 8.2.2201, 8.2.2202, 8.2.2203, 9.0.2205, 9.0.2208, 9.0.2209, 9.0.2303, 9.0.2305, 9.1.2308, 9.1.2312, 9.2.2403, 9.2.2406 (latest FedRAMP release)


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters