<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring Google IDP SAML for Group membership based SSO? in Security</title>
    <link>https://community.splunk.com/t5/Security/Configuring-Google-IDP-SAML-for-Group-membership-based-SSO/m-p/667327#M17364</link>
    <description>&lt;P&gt;I had been struggling with the same problem. After a lot of experimentation with different ideas and inspecting SAML payloads. My two main findings as best as I can tell are:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;When you configure a Google Groups mapping in Google SAML configuration, Google will send the &lt;STRONG&gt;group name&lt;/STRONG&gt; as an attribute identically to if it were an attribute set up in the attribute mapping.&lt;/LI&gt;&lt;LI&gt;When Splunk receives a SAML assertion with a role attribute, I think it will try to match it against roles &lt;EM&gt;as well as &lt;/EM&gt;SAML groups. Though in my case all of the role attributes I use are SAML group names, so I cannot confirm that it will match the "role" attribute against an actual role name.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;EM&gt;But also crucially, &lt;STRONG&gt;when you update Google SAML configurations, it can take 5-10 minutes for the update to "go live". &lt;/STRONG&gt;So watch the SAML assertions that you are actually sending to Splunk as you experiment, because otherwise you'll make a changes and even if you get it right it'll appear to not work, you'll make more changes, and suddenly things work, but actually the working configuration was n attempts ago, and it will break itself as it slowly updates to your later configuration attempts, and all you'll know is that something you tried at some point over the last however long was correct.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;So the net result:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Set the "App attribute" to "role", exactly like you did in your screenshot. If you have created a role in splunk whose name is the same as your Google group, you're done.&lt;/LI&gt;&lt;LI&gt;If your Google group has a different name than your role, then set up a SAML group in Splunk with the same name as your google group and assign it the role you want. Splunk will lowercase the group name, that's fine, it'll still match.&lt;/LI&gt;&lt;LI&gt;As a result, you can actually use &lt;EM&gt;both&lt;/EM&gt; (e.g. a group to grant "user" access, and individual user attributes to grant admin access)&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;In my case, I already had a Google group called "Engineering" that I wanted to set up with the "user" role. Here are my configs:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Splunk:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1. Configure SAML groups with names corresponding to your Google groups&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-11-03 at 09.30.30.png" style="width: 985px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27939iE7BE1743985E32D0/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-11-03 at 09.30.30.png" alt="Screenshot 2023-11-03 at 09.30.30.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;2. Configure your Google SAML configuration. If you plan to use &lt;EM&gt;both&lt;/EM&gt; user attributes &lt;EM&gt;and&lt;/EM&gt; Google groups, set both a user attribute &lt;EM&gt;and&lt;/EM&gt; a Group membership, both pointing to the "role" App attribute. If you only plan on using groups, you can omit the user attribute. In my case, as you can see from my Splunk config above, I want the "Engineering" google group to all have "user" access to Splunk:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-11-03 at 09.31.23.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27940i9BA04413893A5F22/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-11-03 at 09.31.23.png" alt="Screenshot 2023-11-03 at 09.31.23.png" /&gt;&lt;/span&gt;3. If you want to specify role overrides, set them as you did before:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-11-03 at 09.31.50.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27941i962E1F25A2DC8E1D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-11-03 at 09.31.50.png" alt="Screenshot 2023-11-03 at 09.31.50.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4. If it isn't working, decode and review the SAML assertion that Splunk is receiving. &lt;/STRONG&gt;It can take a surprisingly long time for changes made in Google's SAML configuration to go "live". You will likely observe that you're passing along a SAML assertion that does not reflect your most recent Google configuration changes -- if that's the case, just wait a while and try again in a bit.&lt;/P&gt;</description>
    <pubDate>Fri, 03 Nov 2023 14:39:14 GMT</pubDate>
    <dc:creator>ojensen</dc:creator>
    <dc:date>2023-11-03T14:39:14Z</dc:date>
    <item>
      <title>Configuring Google IDP SAML for Group membership based SSO?</title>
      <link>https://community.splunk.com/t5/Security/Configuring-Google-IDP-SAML-for-Group-membership-based-SSO/m-p/640806#M16932</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to use our Google Idp (Google workspace) to enable SSO on our Splunk.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I followed &lt;A href="https://lantern.splunk.com/Data_Descriptors/Google/Configuring_Google_Workspace_as_a_SAML_IdP_with_Splunk_Cloud_Platform" target="_self"&gt;this link&lt;/A&gt; and it worked successfully when adding custom attribute individually to each user.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Now I need to use Google groups for Splunk RBAC so authentication and Authorisation is handled using groups membership.&lt;/P&gt;
&lt;P&gt;When using the Groups membership, I couldnt find any clear answer from Google or Splunk about what to be used here as App Attribute&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aamer86_0-1681987031848.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/25006i98A0561648CF95C4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="aamer86_0-1681987031848.png" alt="aamer86_0-1681987031848.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I only found &lt;A href="https://apps.google.com/supportwidget/articlehome?hl=en&amp;amp;article_url=https%3A%2F%2Fsupport.google.com%2Fa%2Fanswer%2F11143403%3Fhl%3Den&amp;amp;assistant_id=generic-unu&amp;amp;product_context=11143403&amp;amp;product_name=UnuFlow&amp;amp;trigger_context=a" target="_self"&gt;this link&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;which is useless&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I raised a support ticket with google and got this answer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aamer86_1-1681987199879.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/25007iF979E0FB11036F96/image-size/medium?v=v2&amp;amp;px=400" role="button" title="aamer86_1-1681987199879.png" alt="aamer86_1-1681987199879.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you advise on how to setup RBAC using google groups membership or help with Google SAML IDP setup&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 17:21:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Configuring-Google-IDP-SAML-for-Group-membership-based-SSO/m-p/640806#M16932</guid>
      <dc:creator>aamer86</dc:creator>
      <dc:date>2023-04-21T17:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring Google IDP SAML for Group membership based SSO?</title>
      <link>https://community.splunk.com/t5/Security/Configuring-Google-IDP-SAML-for-Group-membership-based-SSO/m-p/667327#M17364</link>
      <description>&lt;P&gt;I had been struggling with the same problem. After a lot of experimentation with different ideas and inspecting SAML payloads. My two main findings as best as I can tell are:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;When you configure a Google Groups mapping in Google SAML configuration, Google will send the &lt;STRONG&gt;group name&lt;/STRONG&gt; as an attribute identically to if it were an attribute set up in the attribute mapping.&lt;/LI&gt;&lt;LI&gt;When Splunk receives a SAML assertion with a role attribute, I think it will try to match it against roles &lt;EM&gt;as well as &lt;/EM&gt;SAML groups. Though in my case all of the role attributes I use are SAML group names, so I cannot confirm that it will match the "role" attribute against an actual role name.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;EM&gt;But also crucially, &lt;STRONG&gt;when you update Google SAML configurations, it can take 5-10 minutes for the update to "go live". &lt;/STRONG&gt;So watch the SAML assertions that you are actually sending to Splunk as you experiment, because otherwise you'll make a changes and even if you get it right it'll appear to not work, you'll make more changes, and suddenly things work, but actually the working configuration was n attempts ago, and it will break itself as it slowly updates to your later configuration attempts, and all you'll know is that something you tried at some point over the last however long was correct.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;So the net result:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Set the "App attribute" to "role", exactly like you did in your screenshot. If you have created a role in splunk whose name is the same as your Google group, you're done.&lt;/LI&gt;&lt;LI&gt;If your Google group has a different name than your role, then set up a SAML group in Splunk with the same name as your google group and assign it the role you want. Splunk will lowercase the group name, that's fine, it'll still match.&lt;/LI&gt;&lt;LI&gt;As a result, you can actually use &lt;EM&gt;both&lt;/EM&gt; (e.g. a group to grant "user" access, and individual user attributes to grant admin access)&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;In my case, I already had a Google group called "Engineering" that I wanted to set up with the "user" role. Here are my configs:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Splunk:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1. Configure SAML groups with names corresponding to your Google groups&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-11-03 at 09.30.30.png" style="width: 985px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27939iE7BE1743985E32D0/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-11-03 at 09.30.30.png" alt="Screenshot 2023-11-03 at 09.30.30.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;2. Configure your Google SAML configuration. If you plan to use &lt;EM&gt;both&lt;/EM&gt; user attributes &lt;EM&gt;and&lt;/EM&gt; Google groups, set both a user attribute &lt;EM&gt;and&lt;/EM&gt; a Group membership, both pointing to the "role" App attribute. If you only plan on using groups, you can omit the user attribute. In my case, as you can see from my Splunk config above, I want the "Engineering" google group to all have "user" access to Splunk:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-11-03 at 09.31.23.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27940i9BA04413893A5F22/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-11-03 at 09.31.23.png" alt="Screenshot 2023-11-03 at 09.31.23.png" /&gt;&lt;/span&gt;3. If you want to specify role overrides, set them as you did before:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-11-03 at 09.31.50.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27941i962E1F25A2DC8E1D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-11-03 at 09.31.50.png" alt="Screenshot 2023-11-03 at 09.31.50.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4. If it isn't working, decode and review the SAML assertion that Splunk is receiving. &lt;/STRONG&gt;It can take a surprisingly long time for changes made in Google's SAML configuration to go "live". You will likely observe that you're passing along a SAML assertion that does not reflect your most recent Google configuration changes -- if that's the case, just wait a while and try again in a bit.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Nov 2023 14:39:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Configuring-Google-IDP-SAML-for-Group-membership-based-SSO/m-p/667327#M17364</guid>
      <dc:creator>ojensen</dc:creator>
      <dc:date>2023-11-03T14:39:14Z</dc:date>
    </item>
  </channel>
</rss>

