Set up native Splunk authentication
Splunk authentication lets you easily set up users to access Splunk platform resources. Available in both Splunk Cloud Platform and Splunk Enterprise, the native authentication scheme always takes precedence over any external authentication schemes.
The Splunk platform authenticates users in the following order:
- Native Splunk authentication
- Lightweight Directory Access Protocol (LDAP), Security Assertion Markup Language (SAML), or scripted authentication (if enabled). For more information, see the following topics:
You cannot use both LDAP and scripted authentication together.
You can create new users and assign roles to those users with a role-based access control system in two ways:
- Use Splunk Web to create users and assign roles. For more information, see Configure users with Splunk Web.
- On Splunk Enterprise only, use the CLI to create users and then assign them to roles with Splunk Web. For more information see Configure users with the CLI. The CLI is not available on Splunk Cloud Platform.
Important naming guidelines when creating users and roles
When you create users and roles within the native authentication scheme, note the following caveats:
- Usernames stored in the native authentication scheme cannot contain spaces, colons, or forward slashes.
- Usernames are not case-sensitive. For example:
JacQueare all the same to the native Splunk authentication scheme.
- Role names must use lowercase characters only. They cannot contain spaces, colons, or forward slashes.
Manage out-of-sync passwords in a search head cluster
Configure users with Splunk Web
This documentation applies to the following versions of Splunk Cloud Platform™: 8.1.2103, 8.2.2104, 8.2.2105 (latest FedRAMP release), 8.2.2106, 8.2.2107