<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Error when configuring ldapsearch with Splunk Supporting Add-on for Active Directory. in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Error-when-configuring-ldapsearch-with-Splunk-Supporting-Add-on/m-p/547407#M65343</link>
    <description>&lt;P&gt;Giving&amp;nbsp;&lt;SPAN&gt;admin_all_objects is not an advisable solution. This gives people way more permission than they need to get LDAP search working and&amp;nbsp;I agree with&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/132642"&gt;@sayantabasak&lt;/a&gt; .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This is what that capability gives people access to do and should only be limited to administrators:&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="5"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;admin_all_objects&lt;/TD&gt;&lt;TD&gt;Lets the user access and modify any object in the system regardless of any restrictions set in the objects. For example user objects, search jobs, reports, and knowledge objects. Lets the user bypass any ACL restrictions, much the way root access in a *nix environment does.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I was able to give my Analysts access to run LDAP queries by adding the following capabilities to their analyst user role:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;list_settings&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;list_storage_passwords&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here is the access list_settings and list_storage_passwords provide. During troubleshooting, I discovered both are required and allows the users to perform gets for the password (to authenticate to AD), but it does not allow them to POST (or write to) the password as the admin_all_objects does and is not required:&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="5"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;list_settings&lt;/TD&gt;&lt;TD&gt;Lets the user list and view server and introspection settings such as the server name, log levels, etc.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="5"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;list_storage_passwords&lt;/TD&gt;&lt;TD&gt;Lets the user list and view the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;/storage/passwords&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;endpoint, lets the user perform GETs. The admin_all_objects capability must be added to the role for the user to perform POSTs to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;/storage/passwords&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;endpoint.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To view more on roles&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/97053"&gt;@3DGjos&lt;/a&gt;, please see the following page on Splunk Docs:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.1.3/Security/Rolesandcapabilities" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/8.1.3/Security/Rolesandcapabilities&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 09 Apr 2021 19:00:11 GMT</pubDate>
    <dc:creator>JeffGolden</dc:creator>
    <dc:date>2021-04-09T19:00:11Z</dc:date>
    <item>
      <title>Error when configuring ldapsearch with Splunk Supporting Add-on for Active Directory.</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Error-when-configuring-ldapsearch-with-Splunk-Supporting-Add-on/m-p/502548#M61858</link>
      <description>&lt;P&gt;I'm working with some  &lt;CODE&gt;ldapsearch&lt;/CODE&gt; searches and I'm having the following problem with one of our search heads. I can't even configure the input, and the interface shows me this error when configuring the connection and when doing any  &lt;CODE&gt;ldapsearch&lt;/CODE&gt; search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;External search command 'ldapsearch' returned error code 1. Script output = " ERROR "HTTPError at ""/opt/splunk/etc/apps/SA-ldapsearch/bin/packages/splunklib/binding.py"", line 1111 : HTTP 403 Forbidden -- insufficient permission to access this resource" ".
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm using a local admin account with all the capabilities needed to perform the configuration:  &lt;CODE&gt;admin_all_objects&lt;/CODE&gt;,  &lt;CODE&gt;list_storage_passwords&lt;/CODE&gt;, and  &lt;CODE&gt;edit_tcp&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;P.S. The add-on works with another search head. My Splunk version is 7.3.1 and my add-on version is 2.1.4.&lt;/P&gt;

&lt;P&gt;Any help will be appreciated, thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 23:09:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Error-when-configuring-ldapsearch-with-Splunk-Supporting-Add-on/m-p/502548#M61858</guid>
      <dc:creator>3DGjos</dc:creator>
      <dc:date>2020-05-18T23:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: Error when configuring ldapsearch with Splunk Supporting Add-on for Active Directory.</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Error-when-configuring-ldapsearch-with-Splunk-Supporting-Add-on/m-p/533338#M64450</link>
      <description>&lt;P&gt;Try with the below additional capabilities and it should work&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;list_settings&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;rest_properties_get&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We got this working without&amp;nbsp;admin_all_objects so you might drop that as well&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2020 14:49:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Error-when-configuring-ldapsearch-with-Splunk-Supporting-Add-on/m-p/533338#M64450</guid>
      <dc:creator>sayantabasak</dc:creator>
      <dc:date>2020-12-16T14:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: Error when configuring ldapsearch with Splunk Supporting Add-on for Active Directory.</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Error-when-configuring-ldapsearch-with-Splunk-Supporting-Add-on/m-p/547407#M65343</link>
      <description>&lt;P&gt;Giving&amp;nbsp;&lt;SPAN&gt;admin_all_objects is not an advisable solution. This gives people way more permission than they need to get LDAP search working and&amp;nbsp;I agree with&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/132642"&gt;@sayantabasak&lt;/a&gt; .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This is what that capability gives people access to do and should only be limited to administrators:&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="5"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;admin_all_objects&lt;/TD&gt;&lt;TD&gt;Lets the user access and modify any object in the system regardless of any restrictions set in the objects. For example user objects, search jobs, reports, and knowledge objects. Lets the user bypass any ACL restrictions, much the way root access in a *nix environment does.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I was able to give my Analysts access to run LDAP queries by adding the following capabilities to their analyst user role:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;list_settings&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;list_storage_passwords&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here is the access list_settings and list_storage_passwords provide. During troubleshooting, I discovered both are required and allows the users to perform gets for the password (to authenticate to AD), but it does not allow them to POST (or write to) the password as the admin_all_objects does and is not required:&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="5"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;list_settings&lt;/TD&gt;&lt;TD&gt;Lets the user list and view server and introspection settings such as the server name, log levels, etc.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="5"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;list_storage_passwords&lt;/TD&gt;&lt;TD&gt;Lets the user list and view the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;/storage/passwords&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;endpoint, lets the user perform GETs. The admin_all_objects capability must be added to the role for the user to perform POSTs to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;/storage/passwords&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;endpoint.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To view more on roles&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/97053"&gt;@3DGjos&lt;/a&gt;, please see the following page on Splunk Docs:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.1.3/Security/Rolesandcapabilities" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/8.1.3/Security/Rolesandcapabilities&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 19:00:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Error-when-configuring-ldapsearch-with-Splunk-Supporting-Add-on/m-p/547407#M65343</guid>
      <dc:creator>JeffGolden</dc:creator>
      <dc:date>2021-04-09T19:00:11Z</dc:date>
    </item>
  </channel>
</rss>

