Security

Multiple Roles inherited from LDAP Group Memberships

dominiquevocat
SplunkTrust
SplunkTrust

I have several indexes and created a role in splunk for each index. We have a RBAC system in place to grant users group memberships in our eDirectory based MetaDirectory. I map each splunk role to a LDAP groupmembership.

If a user has only one groupmembership all works fine.
If a user receives a second group membership it is shown fine in the user overview in Splunk Administration
The user does however not see the content of the index to which it received access by the second (N'th) group membership.

I modeled the role such that they have access to one index, the capability search and rtsearch.

What am i doing wrong?

Tags (2)
1 Solution

dominiquevocat
SplunkTrust
SplunkTrust

The roles were configured via the GUI and i assigned indizes to the roles. Seemingly each role had a srchFilter entry in the authorize.conf which caused the problem. Manually clearing the srchFilter from the authorize.conf seems to solve the issue.

View solution in original post

dominiquevocat
SplunkTrust
SplunkTrust

The roles were configured via the GUI and i assigned indizes to the roles. Seemingly each role had a srchFilter entry in the authorize.conf which caused the problem. Manually clearing the srchFilter from the authorize.conf seems to solve the issue.

Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...