![]() ![]() Note: This value is case sensitive so it should be typed in exactly as you are going to use in the Okta app ( step 18).Ĭheck Sign AuthnRequest and Sign SAML Response. ![]() Metadata Contents: Copy and paste the following: Sign in to Okta Admin app to have this variable generated for you.Įntity ID: Use the following value: Splunk-.įor example, if you log into, use Splunk-acme as the Entity ID. In the SAML Configuration page, enter the following (see screen capture at end of step for reference): In the SAML Settings panel, click SAML Configuration in the upper right hand corner: Login to Splunk Enterprise as an administrator.įor External Authentication Method, select SAML, then click Configure Splunk to use SAML: In Okta, select the Sign On tab for the Splunk Enterprise app, then click Edit.Ĭlick Browse and navigate to the splunkcloud.cert file you just saved ( step 5, above), then click Upload to upload it to Okta. Save the certificate into a non-formatted text file (Notepad for example), and place a row above the certificate with the text -BEGIN CERTIFICATE- and a row below the certificate with the text -END CERTIFICATE. From the metadata, capture the search head's certificate (masked out below) between the and, as shown below: Once SAML is enabled, open the following URL: /saml/spmetadata.įor example, if you log into, you should open this URL. The Okta/Splunk Enterprise SAML integration currently supports the following features:Ĭontact the Splunk Enterprise Support team and request that they enable SAML 2.0 for your account. Please use the Okta Administrator Dashboard to add an application and view the values that are specific for your organization. Usage scope is inherited from the secrets used in the settings.This setup might fail without parameter values that are customized for your organization. If you are going to use multiple providers of the same type, ensure you give each provider a different name. Step 5: Display Name Įnter a display name for the provider. ![]() A user role that is not authenticated with SAML is required. Step 4: Username and Encrypted Password įor secrets and other sensitive settings, select or create a new Harness Encrypted Text secret.Enter the account credentials to authenticate with the server. For example: more information, see Using the REST API with Splunk Cloud from Splunk. Include the port number in the format The default port number is 8089.The port number is required for hosted Splunk, also. The Add Splunk Verification Provider dialog has the following fields.Įnter the URL for accessing the REST API on the Splunk server. The Add Splunk Verification Provider dialog appears. To add Splunk as a verification provider, do the following:Ĭlick Add Verification Provider, and select Splunk. Step 2: Add Splunk Verification Provider However, we could restrict the access to only the few relevant indexes: We've given this role access to All non-internal indexes. Here, we've created a new Splunk role named Harness User, and assigned it search capability: ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |