![]() ![]() This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk apps, such as Splunk Enterprise Security and the Splunk App for PCI Compliance. After the Splunk platform indexes the events, you can consume the data using the prebuilt panels included with the add-on. This add-on also supports remediation commands that allow you to add a user to an Okta group, remove a user from an Okta group, deactivate an Okta user account from the Splunk platform and create custom alert. The add-on collects event information, user information, group information, and application information using Okta Identity Management REST APIs. Whether you need predictability or the flexibility to scale, you have options with Splunk. Our goal is to help you get more value from your data. ![]() The Splunk Add-on for Okta allows a Splunk software administrator to collect data from Okta. Pricing Explore Splunk pricing options that align with your business needs. For more information about the end of availability and support for this add-on, see. See Configure load balancing or SAML bindings.Īn error in configuring SAML can result in users and admins being locked out of the Splunk platform.On March 18, 2019, this add-on has been deprecated and has been transferred to partner support. Populate the advanced section only if you need to set up load balancing or change the SAML binding.For ADFS you can use the displayname for the Attribute Alias Real Name. Use this field to specify a new attribute name on any IdP and then configure an alias in your Splunk deployment for any of the three attributes. ![]() In Alias, provide the following information: In the Alias section optionally provide the following aliasing information:.If '''Request Compression''' is set, when you log onto Splunk Web on a Search Head, you are diverted to Okta Applications rather than the Search Head. This field is the entity ID as configured in the SP connection entry in your IdP. See your IdP documentation if you are not sure where to find this information. When configuring SAML on a search head cluster, you must use the same certificate for each search head. If you use a certificate chain, order them as follows:Ĭheck this to replicate your IdP certificates in a search head cluster. If any validation fails, authentication fails. If you provide a directory, Splunk Enterprise looks at all the certificates in the directory and tries to validate SAML response with each one of them. If you provide a file, Splunk Enterprise uses that file to validate authenticity of SAML response. This value can be a directory or a single file, depending on your IdP requirements. If you do not provide this URL, the user will not be logged out. This field is populated automatically by the metadata file and is the IdP protocol endpoint. Users can also log into their local Splunk account by navigating directly to – splunkweb:port/en-US/account/login?loginType=Splunk To access the login page once SAML is enabled, append the full login URL ( /saml/acs) with loginType=Splunk. It is the protected endpoint on your IdP to which Splunk Enterprise sends authentication requests. This field is populated automatically by your selected metadata file. In General Settings, provide the following information:.Refer to your Okta documentation if you are not sure how to locate your metadata file. Download or browse and select your metadata file, or copy and paste your metadata directly into the text window.On the SAML Groups page, click SAML Configuration.Select SAML as your authentication type.In the Settings menu, select Authentication methods.Confirm that your system meets all of the requirements.Map groups on a SAML identity provider to Splunk user roles so that users in those groups can log in.įor information about configuring Okta as an IdP, consult the Okta documentation. follow these instructions to configure the Splunk platform for single sign-on.Īfter you configure the Splunk platform for SSO, you can map groups form the IdP to those roles so that users can log in. If you use Okta as your Identity Provider (IdP). Configure SSO with Okta as your identity provider ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |