<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: restrict a role by source IP in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742433#M21946</link>
    <description>&lt;P&gt;Splunk server is not the same as the Splunk software running on it. You can limit connectivity on the Splunk server using iptables/firewalld/Windows Firewall...&lt;/P&gt;</description>
    <pubDate>Fri, 21 Mar 2025 17:14:30 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2025-03-21T17:14:30Z</dc:date>
    <item>
      <title>restrict a role by source IP</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742379#M21936</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;is it possible to restrict Splunk roles by source IP?&lt;/P&gt;&lt;P&gt;example:&lt;BR /&gt;Splunk role: my_user_role, allowed source IPs 172.16.0.0/16&lt;BR /&gt;Splunk role: my_admin_role, allowed source IPs 192.168.1.5, 192.168.1.6&lt;BR /&gt;&lt;BR /&gt;Kind Regards&lt;BR /&gt;&lt;SPAN&gt;Andre&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 00:29:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742379#M21936</guid>
      <dc:creator>Andre_</dc:creator>
      <dc:date>2025-03-21T00:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: restrict a role by source IP</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742389#M21938</link>
      <description>&lt;P&gt;Not directly. You could do something like that with SAML probably if your identity provider could allow/deny login based on IP-criteria. But be aware that even then it would only work during the initial login. If the user switched to another network while having a logged-in session, he would still be logged in with his role.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 06:31:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742389#M21938</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-03-21T06:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: restrict a role by source IP</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742401#M21941</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/276092"&gt;@Andre_&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;No Splunk has no controls based on network source. Only user to role mapping.&amp;nbsp; T&lt;SPAN&gt;his is not doable in the Splunk server configuration.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;But a common and effective way to restrict access to Splunk roles based on source IP is to place Splunk behind a reverse proxy (e.g., Apache or NGINX) and configure the proxy to handle IP-based restrictions.&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;However, I haven’t experimented with this approach yet.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.1/Security/Rolesandcapabilities" target="_blank" rel="noopener"&gt;Define roles on the Splunk platform with capabilities - Splunk Documentation&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.1/Security/AboutUsersAndRoles" target="_blank" rel="noopener"&gt;About configuring role-based user access - Splunk Documentation&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Mar 2025 08:21:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742401#M21941</guid>
      <dc:creator>kiran_panchavat</dc:creator>
      <dc:date>2025-03-21T08:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: restrict a role by source IP</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742412#M21943</link>
      <description>&lt;P&gt;Again - you're talking about a completely different thing.&lt;/P&gt;&lt;P&gt;One thing is general IP-based restrictions - this you can do on a reverse-proxy or even directly on Splunk server itself using access rules for ports.&lt;/P&gt;&lt;P&gt;Another thing is restricting given roles or users to specific IP-s. Again - this could also be done if the proxy was acting as an SSO source for Splunk but that is as tricky as any other SSO and still you could easily "escape" this IP-restriction after initial login.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 11:42:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742412#M21943</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-03-21T11:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: restrict a role by source IP</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742413#M21944</link>
      <description>&lt;DIV&gt;Splunk doesn’t do IP-based restrictions natively, it’s all user-to-role mapping.. They’d need a reverse proxy like NGINX to restrict by IP, but that’s outside Splunk itself. Mixing the two is a category error.&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Mar 2025 12:17:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742413#M21944</guid>
      <dc:creator>kiran_panchavat</dc:creator>
      <dc:date>2025-03-21T12:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: restrict a role by source IP</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742433#M21946</link>
      <description>&lt;P&gt;Splunk server is not the same as the Splunk software running on it. You can limit connectivity on the Splunk server using iptables/firewalld/Windows Firewall...&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 17:14:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742433#M21946</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-03-21T17:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: restrict a role by source IP</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742483#M21957</link>
      <description>&lt;P&gt;Thank&amp;nbsp;you&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I think that would work for us, we have SAML and limit it to Kerberos only. This should prevent taking your session with you from from one network segment to another (network segments are different AD Domains too).&lt;/P&gt;&lt;P&gt;With SAML auth, can you still manage the role assignments from Splunk, like AD Group -&amp;gt; role, or does that need to be done on the SAML provider?&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Andre&lt;/P&gt;</description>
      <pubDate>Sun, 23 Mar 2025 22:10:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742483#M21957</guid>
      <dc:creator>Andre_</dc:creator>
      <dc:date>2025-03-23T22:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: restrict a role by source IP</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742484#M21958</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/264857"&gt;@kiran_panchavat&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;that doesn't work for us, we need role restriction by IP not service or server restriction.&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Andre&lt;/P&gt;</description>
      <pubDate>Sun, 23 Mar 2025 22:12:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742484#M21958</guid>
      <dc:creator>Andre_</dc:creator>
      <dc:date>2025-03-23T22:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: restrict a role by source IP</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742485#M21959</link>
      <description>Maybe you should create an idea for that in ideas.splunk.com?</description>
      <pubDate>Sun, 23 Mar 2025 22:34:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742485#M21959</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2025-03-23T22:34:42Z</dc:date>
    </item>
    <item>
      <title>Re: restrict a role by source IP</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742486#M21960</link>
      <description>&lt;P&gt;EID-I-2530&lt;/P&gt;</description>
      <pubDate>Sun, 23 Mar 2025 22:44:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/restrict-a-role-by-source-IP/m-p/742486#M21960</guid>
      <dc:creator>Andre_</dc:creator>
      <dc:date>2025-03-23T22:44:21Z</dc:date>
    </item>
  </channel>
</rss>

