<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Specifying multiple LDAP static group filters in Security</title>
    <link>https://community.splunk.com/t5/Security/Specifying-multiple-LDAP-static-group-filters/m-p/73465#M2427</link>
    <description>&lt;P&gt;LDAP "Group base DN"&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;OU=Corporate,OU=Groups,DC=OUR,DC=COMPANY,DC=COM
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;"Static group search filter"&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(|(CN=Splunk*)(CN=UNIX*)(CN=WINTEL*))
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This pulls all the groups starting with Splunk, UNIX and WINTEL.&lt;/P&gt;

&lt;P&gt;You could also do something with wildcards.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(|(CN=Splunk*)(CN=*UNIX*)(CN=*WINTEL*))
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This pulls all the groups starting with Splunk, and contains UNIX or WINTEL.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Sep 2013 18:36:01 GMT</pubDate>
    <dc:creator>dfronck</dc:creator>
    <dc:date>2013-09-23T18:36:01Z</dc:date>
    <item>
      <title>Specifying multiple LDAP static group filters</title>
      <link>https://community.splunk.com/t5/Security/Specifying-multiple-LDAP-static-group-filters/m-p/73463#M2425</link>
      <description>&lt;P&gt;Is there a way to specify multiple group search filters for multiple groups? Currently we have this (sAMAccountName = ISD TSS Management) but is there a way to specify additional groups in this filter?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2013 17:04:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Specifying-multiple-LDAP-static-group-filters/m-p/73463#M2425</guid>
      <dc:creator>aaronkorn</dc:creator>
      <dc:date>2013-03-25T17:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: Specifying multiple LDAP static group filters</title>
      <link>https://community.splunk.com/t5/Security/Specifying-multiple-LDAP-static-group-filters/m-p/73464#M2426</link>
      <description>&lt;P&gt;We specify multiple AD groups in "Group base DN" field under "Group settings" as 'cn=admingrp,ou=...;cn=usergrp,ou=...'.  We do not use "Static group search filter.&lt;/P&gt;

&lt;P&gt;The groups are then mapped to each local Splunk role for access control.&lt;/P&gt;

&lt;P&gt;The "User base filter" is defined as follow:&lt;/P&gt;

&lt;P&gt;(&amp;amp;(objectCategory=Person)(sAMAccountName=*))&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2013 17:44:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Specifying-multiple-LDAP-static-group-filters/m-p/73464#M2426</guid>
      <dc:creator>yungm</dc:creator>
      <dc:date>2013-03-25T17:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Specifying multiple LDAP static group filters</title>
      <link>https://community.splunk.com/t5/Security/Specifying-multiple-LDAP-static-group-filters/m-p/73465#M2427</link>
      <description>&lt;P&gt;LDAP "Group base DN"&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;OU=Corporate,OU=Groups,DC=OUR,DC=COMPANY,DC=COM
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;"Static group search filter"&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(|(CN=Splunk*)(CN=UNIX*)(CN=WINTEL*))
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This pulls all the groups starting with Splunk, UNIX and WINTEL.&lt;/P&gt;

&lt;P&gt;You could also do something with wildcards.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(|(CN=Splunk*)(CN=*UNIX*)(CN=*WINTEL*))
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This pulls all the groups starting with Splunk, and contains UNIX or WINTEL.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2013 18:36:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Specifying-multiple-LDAP-static-group-filters/m-p/73465#M2427</guid>
      <dc:creator>dfronck</dc:creator>
      <dc:date>2013-09-23T18:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Specifying multiple LDAP static group filters</title>
      <link>https://community.splunk.com/t5/Security/Specifying-multiple-LDAP-static-group-filters/m-p/73466#M2428</link>
      <description>&lt;P&gt;&lt;CODE&gt;(CN=Splunk*)&lt;/CODE&gt;&lt;BR /&gt;
This syntax worked fine for us to only display groups for mapping that begin with "Splunk"; but, the &lt;STRONG&gt;BIG&lt;/STRONG&gt; difference is the &lt;STRONG&gt;groups have to be populated with users&lt;/STRONG&gt; or Splunk produces a cryptic error stating that it can't find any groups with the search criteria.  The better error would be that I can't find any groups WITH USERS IN IT with the search criteria.  Limiting the DN of the group produces the same error if the group is empty.&lt;/P&gt;

&lt;P&gt;It seems like a Splunk proces logic flaw.  On every system for 25years the process is: Create Groups &amp;gt; Map Roles &amp;gt; Populate groups with users and test.&lt;BR /&gt;
,&lt;CODE&gt;(CN=Splunk*)&lt;/CODE&gt;&lt;BR /&gt;
This syntax worked fine for us to only display groups for mapping that begin with "Splunk"; but, the &lt;STRONG&gt;BIG&lt;/STRONG&gt; difference is the &lt;STRONG&gt;groups have to be populated with users&lt;/STRONG&gt; or Splunk produces a cryptic error stating that it can't find any groups with the search criteria.  The better error would be that I can't find any groups WITH USERS IN IT with the search criteria.  Limiting the DN of the group produces the same error if the group is empty.&lt;/P&gt;

&lt;P&gt;It seems like a Splunk proces logic flaw.  On every system for 25years the process is: Create Groups &amp;gt; Map Roles &amp;gt; Populate groups with users and test.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2017 16:14:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Specifying-multiple-LDAP-static-group-filters/m-p/73466#M2428</guid>
      <dc:creator>3johnson</dc:creator>
      <dc:date>2017-01-25T16:14:53Z</dc:date>
    </item>
  </channel>
</rss>

