Splunk Cloud Platform

Securing Splunk Cloud Platform

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

Manage Splunk Cloud Platform users and roles

Contents have been relocated

The content in this topic has been integrated into several other topics in this manual. See the following links to learn about Splunk capabilities and how to perform user and role management on Splunk Cloud Platform:

Last modified on 28 June, 2023
PREVIOUS
Secure access for Splunk knowledge objects
  NEXT
Protect PII, PHI, and other sensitive data with field filters

This documentation applies to the following versions of Splunk Cloud Platform: 8.2.2112, 8.2.2201, 8.2.2202, 8.2.2203, 9.0.2205, 9.0.2208, 9.0.2209, 9.0.2303, 9.0.2305, 9.1.2308 (latest FedRAMP release), 9.1.2312


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters