<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD / LDAP Authentication Limit issues in Security</title>
    <link>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93798#M3103</link>
    <description>&lt;P&gt;I have the same issue with or without nested groups enabled.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Nov 2013 14:49:18 GMT</pubDate>
    <dc:creator>s72ucor</dc:creator>
    <dc:date>2013-11-21T14:49:18Z</dc:date>
    <item>
      <title>AD / LDAP Authentication Limit issues</title>
      <link>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93794#M3099</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;

&lt;P&gt;I've managed to get my Splunk (5.0.latest) referring to my Active Directory Domain Controllers to allow a number of user logins, however at this time, it is only working if I explicitly specify the User and group DN's on the LDAP config page.  &lt;/P&gt;

&lt;P&gt;What I'd love to do is have the ldap Plugins simply look at the User OU and Group OU and allow me to then pick which groups I want to map.&lt;/P&gt;

&lt;P&gt;I've tried fiddling with the silzelimit and a few other functions, and even pointing at an OU with only 1 user / group, but no matter what is tried, I always get the Query Size Limit Exceeded error.&lt;/P&gt;

&lt;P&gt;Any ideas how I can resolve this issue?&lt;BR /&gt;
Here is an example of a working section of the Authentication.conf:&lt;BR /&gt;
[Admin Users]&lt;BR /&gt;
SSLEnabled = 1&lt;BR /&gt;
anonymous_referrals = 0&lt;BR /&gt;
bindDN = CN=Splunk ldap,OU=Service Accounts,OU=STUFF,DC=DOMAIN,DC=ltd&lt;BR /&gt;
bindDNpassword = blah&lt;BR /&gt;
charset = utf8&lt;BR /&gt;
groupBaseDN = CN=Splunk Sysadmins,OU=User Groups,OU=STUFF,DC=DOMAIN,DC=ltd&lt;BR /&gt;
groupMappingAttribute = dn&lt;BR /&gt;
groupMemberAttribute = member&lt;BR /&gt;
groupNameAttribute = cn&lt;BR /&gt;
host = 10.100.100.11&lt;BR /&gt;
nestedGroups = 1&lt;BR /&gt;
network_timeout = 20&lt;BR /&gt;
port = 3269&lt;BR /&gt;
realNameAttribute = name&lt;BR /&gt;
sizelimit = 10000&lt;BR /&gt;
timelimit = 15&lt;BR /&gt;
userBaseDN = CN=ME, CN=Users,DC=Vtesse,DC=ltd&lt;BR /&gt;
userNameAttribute = samaccountname&lt;/P&gt;

&lt;P&gt;TIA&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:43:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93794#M3099</guid>
      <dc:creator>Vtesse</dc:creator>
      <dc:date>2020-09-28T13:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: AD / LDAP Authentication Limit issues</title>
      <link>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93795#M3100</link>
      <description>&lt;P&gt;You can configure this with the web GUI at:&lt;/P&gt;

&lt;P&gt;Manager &amp;gt; Access controls &amp;gt; Authentication method&lt;/P&gt;

&lt;P&gt;Turn LDAP on&lt;/P&gt;

&lt;P&gt;Click on Configure Splunk to use LDAP and map groups &lt;/P&gt;

&lt;P&gt;Define a new LDAP strategy. In the strategy you can define search filters to have multiple groups.&lt;/P&gt;

&lt;P&gt;After that you can map the groups to user roles.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2013 11:10:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93795#M3100</guid>
      <dc:creator>krugger</dc:creator>
      <dc:date>2013-04-15T11:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: AD / LDAP Authentication Limit issues</title>
      <link>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93796#M3101</link>
      <description>&lt;P&gt;Indeed you can.&lt;BR /&gt;
That's where I've configured this entry. &lt;BR /&gt;
The problem is, when I enter the OU's in groupBaseDN and userBaseDN, I get the "too many lines returned" error from the LDAP plugin. Even if I&lt;BR /&gt;
A) point them at an OU with only 2 entries&lt;BR /&gt;
B) Increase the sizelimit to something silly.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2013 13:13:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93796#M3101</guid>
      <dc:creator>Vtesse</dc:creator>
      <dc:date>2013-04-15T13:13:39Z</dc:date>
    </item>
    <item>
      <title>Re: AD / LDAP Authentication Limit issues</title>
      <link>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93797#M3102</link>
      <description>&lt;P&gt;I wonder if your nestedGroups setting is the source of your "too many lines" issue.&lt;/P&gt;

&lt;P&gt;Also, while your environment may differ, a few of the identifying attributes are different from what I normally use when setting up AD auth for systems like Splunk.&lt;/P&gt;

&lt;P&gt;here are the attributes I use in my splunk environment:&lt;/P&gt;

&lt;P&gt;groupMappingAttribute = distinguishedname&lt;BR /&gt;
groupMemberAttribute = member&lt;BR /&gt;
groupNameAttribute = name&lt;BR /&gt;
realNameAttribute = displayname&lt;BR /&gt;
userNameAttribute = samaccountname&lt;/P&gt;

&lt;P&gt;as for the filters, Microsoft has a very in-depth article on LDAP filters and examples specific to AD that I believe anyone configuring AD auth should have bookmarked:&lt;BR /&gt;
&lt;A href="http://social.technet.microsoft.com/wiki/contents/articles/5392.active-directory-ldap-syntax-filters.aspx"&gt;http://social.technet.microsoft.com/wiki/contents/articles/5392.active-directory-ldap-syntax-filters.aspx&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2013 13:58:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93797#M3102</guid>
      <dc:creator>JoeIII</dc:creator>
      <dc:date>2013-08-27T13:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: AD / LDAP Authentication Limit issues</title>
      <link>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93798#M3103</link>
      <description>&lt;P&gt;I have the same issue with or without nested groups enabled.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2013 14:49:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93798#M3103</guid>
      <dc:creator>s72ucor</dc:creator>
      <dc:date>2013-11-21T14:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: AD / LDAP Authentication Limit issues</title>
      <link>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93799#M3104</link>
      <description>&lt;P&gt;I've noticed that if I create an AD group for specific access (i.e. users) and then add users to that group I can get this to work; however, I needed to define the group by editing "&lt;SPLUNKDIR&gt;/etc/syslog/local/authentication.conf" via the CLI.  Even if I edit the configuration file and set the limit to 1000+,10000+,100000+,1000000+ it doesn't change the behavior.  This makes me think that the issue isn't a LDAP issue, rather a GUI issue.  I noticed that even with the limit change the GUI still only shows 1000 entries.  Here's what I did to make things work:&lt;/SPLUNKDIR&gt;&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Configure the "LDAP strategy" via the GUI. &lt;/LI&gt;
&lt;LI&gt;Edit &lt;SPLUNKDIR&gt;/etc/syslog/local/authentication.conf"&lt;/SPLUNKDIR&gt;&lt;/LI&gt;
&lt;LI&gt;Under the LDAP definition create your user access similar to the following:&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;[roleMap_&lt;EM&gt;LDAPStrategyName&lt;/EM&gt;]&lt;/P&gt;

&lt;P&gt;user = &lt;EM&gt;LDAPGroupName&lt;/EM&gt;&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Restart Splunk&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Once I created the new AD config and defined the users via the CLI I restarted splunk and all these users that were supposed to have access were imported.  In addition I was able to add new users to the AD group and use the GUI "Reload Authentication Configuration" button on under "Manager » Access controls » Authentication method".&lt;/P&gt;

&lt;P&gt;I know this isn't a GUI solution, but it did solve me problem.  I'm using Splunk 5.5 on Linux.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2013 15:32:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93799#M3104</guid>
      <dc:creator>s72ucor</dc:creator>
      <dc:date>2013-11-21T15:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: AD / LDAP Authentication Limit issues</title>
      <link>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93800#M3105</link>
      <description>&lt;P&gt;This is the response that helped me solve this issue. I had to add a user that had already signed in to Splunk, to the AD group for the UI to display/recognize the group, so that I could map it.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2014 16:31:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/AD-LDAP-Authentication-Limit-issues/m-p/93800#M3105</guid>
      <dc:creator>neiljpeterson</dc:creator>
      <dc:date>2014-03-25T16:31:11Z</dc:date>
    </item>
  </channel>
</rss>

