<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restricting index access with srchIndexesDisallowed overwrites other group permissions in Security</title>
    <link>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530214#M11955</link>
    <description>&lt;P&gt;Does the "allowA" role inherit from any other roles?&amp;nbsp; If so, what are the settings for those roles?&lt;/P&gt;</description>
    <pubDate>Fri, 20 Nov 2020 14:26:48 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2020-11-20T14:26:48Z</dc:date>
    <item>
      <title>Restricting index access with srchIndexesDisallowed overwrites other group permissions</title>
      <link>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530168#M11954</link>
      <description>&lt;P&gt;We have a setup where all users by default have access to all indexes. Now we have to restrict the access to a specific index and give it only to selected users&lt;/P&gt;&lt;P&gt;Following &lt;A href="https://community.splunk.com/t5/Security/How-to-restrict-access-to-one-certain-index-without-changing-all/m-p/185101/thread-id/5468" target="_self"&gt;this discussion&lt;/A&gt; I found the srchIndexesDisallowed&amp;nbsp;capability listed in the latest &lt;A href="https://docs.splunk.com/Documentation/Splunk/8.1.0/Admin/Authorizeconf" target="_self"&gt;authorize.conf&lt;/A&gt; user manual ( 8.1.0 ), which made me extremely happy. But I'm having some problems after testing it&lt;BR /&gt;&lt;BR /&gt;I have "&lt;STRONG&gt;super&lt;/STRONG&gt;" group with&lt;/P&gt;&lt;P&gt;srchIndexesAllowed = *&lt;BR /&gt;srchIndexesDisallowed = indexA&lt;BR /&gt;&lt;BR /&gt;and "&lt;STRONG&gt;allowA&lt;/STRONG&gt;" group with&lt;BR /&gt;srchIndexesAllowed = indexA&lt;BR /&gt;&lt;BR /&gt;What I expect to happen is:&lt;BR /&gt;people in the &lt;STRONG&gt;super&lt;/STRONG&gt; group have access to all indexes except indexA&lt;BR /&gt;people in the &lt;STRONG&gt;super&lt;/STRONG&gt; and &lt;STRONG&gt;allowA&lt;/STRONG&gt; group have access to all indexes ( including indexA )&lt;BR /&gt;&lt;BR /&gt;unfortunately it looks like the srchIndexesDisallowed in &lt;STRONG&gt;super&lt;/STRONG&gt; is overwriting the srchIndexesAllowed in &lt;STRONG&gt;allowA&lt;/STRONG&gt;&lt;BR /&gt;I've double-checked and if a user is member only of &lt;STRONG&gt;allowA&lt;/STRONG&gt; they can access it&lt;BR /&gt;&lt;BR /&gt;I don't imagine this is the intended behavior&lt;BR /&gt;I'm wondering if someone else has looked into this and figured out a solution ( not counting all the suggestions in the above linked thread )&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 08:55:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530168#M11954</guid>
      <dc:creator>vasial</dc:creator>
      <dc:date>2020-11-20T08:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting index access with srchIndexesDisallowed overwrites other group permissions</title>
      <link>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530214#M11955</link>
      <description>&lt;P&gt;Does the "allowA" role inherit from any other roles?&amp;nbsp; If so, what are the settings for those roles?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 14:26:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530214#M11955</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-11-20T14:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting index access with srchIndexesDisallowed overwrites other group permissions</title>
      <link>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530219#M11956</link>
      <description>&lt;P&gt;&lt;STRONG&gt;allowA&lt;/STRONG&gt; does now inherit any roles&lt;BR /&gt;&lt;BR /&gt;This is how it's set-up ( copied work-in progress from another role &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[role_allowA]&lt;BR /&gt;srchIndexesAllowed = indexA&lt;BR /&gt;srchIndexesDefault = indexA&lt;BR /&gt;accelerate_search = enabled&lt;BR /&gt;cumulativeRTSrchJobsQuota = 0&lt;BR /&gt;cumulativeSrchJobsQuota = 0&lt;BR /&gt;dispatch_rest_to_indexers = enabled&lt;BR /&gt;export_results_is_visible = enabled&lt;BR /&gt;get_metadata = enabled&lt;BR /&gt;get_typeahead = enabled&lt;BR /&gt;input_file = enabled&lt;BR /&gt;output_file = enabled&lt;BR /&gt;pattern_detect = enabled&lt;BR /&gt;request_remote_tok = enabled&lt;BR /&gt;rest_apps_view = enabled&lt;BR /&gt;rest_properties_get = enabled&lt;BR /&gt;rest_properties_set = enabled&lt;BR /&gt;search = enabled&lt;BR /&gt;srchMaxTime = 0&lt;BR /&gt;&lt;BR /&gt;The &lt;STRONG&gt;super&lt;/STRONG&gt; role inherits user and is basically the same with some extra perks and the srchIndexesDisallowed=indexA&lt;/P&gt;</description>
      <pubDate>Fri, 20 Nov 2020 14:40:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530219#M11956</guid>
      <dc:creator>vasial</dc:creator>
      <dc:date>2020-11-20T14:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting index access with srchIndexesDisallowed overwrites other group permissions</title>
      <link>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530228#M11957</link>
      <description>&lt;P&gt;Is it possible another config file is interfering with your settings?&amp;nbsp; Run btool to check.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;splunk btool --debug authorize list role_allowA&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 20 Nov 2020 15:30:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530228#M11957</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-11-20T15:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting index access with srchIndexesDisallowed overwrites other group permissions</title>
      <link>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530393#M11958</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;, not as far as I can see&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Running it on the search-heads I get&lt;BR /&gt;&lt;BR /&gt;# sudo -u splunk /opt/splunk/bin/splunk btool --debug authorize list role_allowA&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf [role_allowA]&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf accelerate_search = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf cumulativeRTSrchJobsQuota = 0&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf cumulativeSrchJobsQuota = 0&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf dispatch_rest_to_indexers = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf export_results_is_visible = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf get_metadata = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf get_typeahead = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf input_file = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf output_file = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf pattern_detect = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf request_remote_tok = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf rest_apps_view = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf rest_properties_get = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf rest_properties_set = enabled&lt;BR /&gt;/opt/splunk/etc/system/default/authorize.conf rtSrchJobsQuota = 6&lt;BR /&gt;/opt/splunk/etc/system/default/authorize.conf run_collect = enabled&lt;BR /&gt;/opt/splunk/etc/system/default/authorize.conf run_mcollect = enabled&lt;BR /&gt;/opt/splunk/etc/system/default/authorize.conf schedule_rtsearch = enabled&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf search = enabled&lt;BR /&gt;/opt/splunk/etc/system/default/authorize.conf srchDiskQuota = 100&lt;BR /&gt;/opt/splunk/etc/system/default/authorize.conf srchFilterSelecting = true&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf srchIndexesAllowed = indexA&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf srchIndexesDefault = indexA&lt;BR /&gt;/opt/splunk/etc/system/default/authorize.conf srchJobsQuota = 3&lt;BR /&gt;/opt/splunk/etc/apps/base_searchhead_config/default/authorize.conf srchMaxTime = 0&lt;BR /&gt;&lt;BR /&gt;I get the same output from /default/authorize.conf when looking at role_super&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 08:39:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530393#M11958</guid>
      <dc:creator>vasial</dc:creator>
      <dc:date>2020-11-23T08:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting index access with srchIndexesDisallowed overwrites other group permissions</title>
      <link>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530435#M11959</link>
      <description>&lt;P&gt;Users in both the super and allowA roles will have permissions that are combined from both roles.&amp;nbsp; That means they will have both&amp;nbsp;&lt;SPAN&gt;&lt;FONT face="courier new,courier"&gt;srchIndexesAllowed = indexA&lt;/FONT&gt; AND&amp;nbsp;&lt;FONT face="courier new,courier"&gt;srchIndexesDisallowed = indexA&lt;/FONT&gt;.&amp;nbsp; Since both can't be true at the same time, one must win out and that one is the disallow entry.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 14:22:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530435#M11959</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-11-23T14:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting index access with srchIndexesDisallowed overwrites other group permissions</title>
      <link>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530538#M11963</link>
      <description>&lt;P&gt;With the current behavior I don't see how the problem raised in the &lt;A href="https://community.splunk.com/t5/Security/How-to-restrict-access-to-one-certain-index-without-changing-all/m-p/185101/thread-id/5468" target="_self"&gt;mentioned discussion&lt;/A&gt; is resolved. I imagine srchIndexesDisallowed was introduced with that in mind&lt;BR /&gt;&lt;BR /&gt;True, I can create a role that disallows indexA and then have a role with access to everything, but what happens when security indexB is introduced and a separate group of people need access only to that. It will be back to the clunky solution of listing allowed indexes for each role and updating that list every time a new index is introduced&lt;/P&gt;&lt;P&gt;I imagined that a list of allowed indexes would be parsed from each role and then combined to allow for more complex access management, instead of the rules overwriting each other&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 08:53:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530538#M11963</guid>
      <dc:creator>vasial</dc:creator>
      <dc:date>2020-11-24T08:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting index access with srchIndexesDisallowed overwrites other group permissions</title>
      <link>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530607#M11964</link>
      <description>&lt;P&gt;In Splunk, disallow ("blacklist" in other configs) trumps allow ("whitelist") so a global block will always block.&amp;nbsp; It has to be one way or the other and this is the path Splunk chose.&lt;/P&gt;&lt;P&gt;If indexB is created for the exclusive use by one role then all other roles must be modified to disallow access to indexB.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 14:17:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/530607#M11964</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-11-24T14:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting index access with srchIndexesDisallowed overwrites other group permissions</title>
      <link>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/581464#M15817</link>
      <description>&lt;P&gt;I had a requirement to do something similar. This is what I did, but if I have the need to scale it further then I may have to revisit parts of it:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create a new role &lt;STRONG&gt;user_standard&lt;/STRONG&gt; that inherits from &lt;STRONG&gt;user&lt;/STRONG&gt; role (and adds nothing else). Most users are assigned this role.&lt;/LI&gt;&lt;LI&gt;Configure&amp;nbsp;&lt;STRONG&gt;srchIndexesDisallowed&lt;/STRONG&gt; in&amp;nbsp;&lt;STRONG&gt;user_standard&lt;/STRONG&gt;&amp;nbsp;role to exclude the indexes that should not be accessible to regular users&lt;/LI&gt;&lt;LI&gt;Create another role &lt;STRONG&gt;user_elevated&lt;/STRONG&gt; that also inherits from &lt;STRONG&gt;user&lt;/STRONG&gt; role but does not restrict via&amp;nbsp;&lt;STRONG&gt;srchIndexesDisallowed&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This seems to work for what I need while also avoiding the overhead of having to maintain permissions on specific indexes as new indexes are added.&lt;/P&gt;&lt;P&gt;As mentioned, if lots of permutations of index access become necessary then this will get messy. It'd be much better if we were able to layer the roles to add/remove permissions, but I can see why Splunk took the approach of most-restrictive access where data access security is concerned.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 14:02:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Restricting-index-access-with-srchIndexesDisallowed-overwrites/m-p/581464#M15817</guid>
      <dc:creator>mattbg</dc:creator>
      <dc:date>2022-01-18T14:02:28Z</dc:date>
    </item>
  </channel>
</rss>

