A user action within the Splunk platform. You can use role-based security to restrict user actions in the software. For example, you can allow users to list data inputs but not to edit them. The Splunk platform associates capabilities with specific roles. The authorize.conf configuration file provides a list of the user actions that you can use to configure roles.

For more information

In the Splunk Enterprise Admin Manual:

In Securing Splunk Cloud Platform:

In Securing Splunk Enterprise: