<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: authentication method in a query on splunk in Security</title>
    <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462190#M10752</link>
    <description>&lt;P&gt;it did not work for me, there were users that appeared with no type (Probably because they no longer exist)&lt;/P&gt;</description>
    <pubDate>Wed, 05 Feb 2020 16:30:47 GMT</pubDate>
    <dc:creator>rsaude</dc:creator>
    <dc:date>2020-02-05T16:30:47Z</dc:date>
    <item>
      <title>authentication method in a query on splunk</title>
      <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462186#M10748</link>
      <description>&lt;P&gt;Hey everyone, &lt;/P&gt;

&lt;P&gt;Is there a way to check for which kind of authentication method is being used by splunk in a log? (Splunk itself, SAML or LDAP)&lt;/P&gt;

&lt;P&gt;Thanks in advanced&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 15:13:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462186#M10748</guid>
      <dc:creator>rsaude</dc:creator>
      <dc:date>2020-02-05T15:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: authentication method in a query on splunk</title>
      <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462187#M10749</link>
      <description>&lt;P&gt;As far as I know that in splunk logs those information are not available.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:09:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462187#M10749</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2020-02-05T16:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: authentication method in a query on splunk</title>
      <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462188#M10750</link>
      <description>&lt;P&gt;i feard that, in any case if anyone knows a work around feel free to share please&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:11:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462188#M10750</guid>
      <dc:creator>rsaude</dc:creator>
      <dc:date>2020-02-05T16:11:50Z</dc:date>
    </item>
    <item>
      <title>Re: authentication method in a query on splunk</title>
      <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462189#M10751</link>
      <description>&lt;P&gt;Try below search (It is ugly because of join) but I think it will give you a result.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_audit host=&amp;lt;your host&amp;gt; action="login attempt"
| fields user, action, info, src 
| join type=left user
    [| rest /services/authentication/users splunk_server=local f=title f=type 
    | rename title as user 
    | fields user, type ]
| table user, type, action, info, src
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:26:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462189#M10751</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2020-02-05T16:26:43Z</dc:date>
    </item>
    <item>
      <title>Re: authentication method in a query on splunk</title>
      <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462190#M10752</link>
      <description>&lt;P&gt;it did not work for me, there were users that appeared with no type (Probably because they no longer exist)&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:30:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462190#M10752</guid>
      <dc:creator>rsaude</dc:creator>
      <dc:date>2020-02-05T16:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: authentication method in a query on splunk</title>
      <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462191#M10753</link>
      <description>&lt;P&gt;I managed to get it working for me, but thank you for your help anyway &lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:33:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462191#M10753</guid>
      <dc:creator>rsaude</dc:creator>
      <dc:date>2020-02-05T16:33:02Z</dc:date>
    </item>
    <item>
      <title>Re: authentication method in a query on splunk</title>
      <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462192#M10754</link>
      <description>&lt;P&gt;With the app &lt;A href="https://splunkbase.splunk.com/app/1866/"&gt;https://splunkbase.splunk.com/app/1866/&lt;/A&gt;&lt;BR /&gt;
i was able to get one of the dashboards which displayed what i wanted,&lt;/P&gt;

&lt;P&gt;Name:  Users by authentication type&lt;BR /&gt;
Code:   &lt;CODE&gt;| rest splunk_server=local /services/authentication/users | stats count by type&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:33:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462192#M10754</guid>
      <dc:creator>rsaude</dc:creator>
      <dc:date>2020-02-05T16:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: authentication method in a query on splunk</title>
      <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462193#M10755</link>
      <description>&lt;P&gt;It's not 100% correct since it wasn't in a log but since i got it to work i'll call it a win.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:34:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462193#M10755</guid>
      <dc:creator>rsaude</dc:creator>
      <dc:date>2020-02-05T16:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: authentication method in a query on splunk</title>
      <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462194#M10756</link>
      <description>&lt;P&gt;Yes, query which I have provided will give you type if that user exist in splunk, it it does not exist then it will give you blank.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:38:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462194#M10756</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2020-02-05T16:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: authentication method in a query on splunk</title>
      <link>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462195#M10757</link>
      <description>&lt;P&gt;Welcome... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:38:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/authentication-method-in-a-query-on-splunk/m-p/462195#M10757</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2020-02-05T16:38:36Z</dc:date>
    </item>
  </channel>
</rss>

