Security

Can the PASSWORD within user-seed.conf be hashed rather than in clear text?

chris_barrett
SplunkTrust
SplunkTrust

Can the PASSWORD in the user-seed.conf file be a hashed representation, or does it need to be specified in the clear?

1 Solution

chris_barrett
SplunkTrust
SplunkTrust

Answering my own question here ... The ability to specify a hashed password was added in Splunk 7.1.0.

Ref: http://docs.splunk.com/Documentation/Splunk/7.1.0/Admin/User-seedconf

View solution in original post

0 Karma

chris_barrett
SplunkTrust
SplunkTrust

Answering my own question here ... The ability to specify a hashed password was added in Splunk 7.1.0.

Ref: http://docs.splunk.com/Documentation/Splunk/7.1.0/Admin/User-seedconf

0 Karma

acharlieh
Influencer

Trying it out on 6.5.3 on Mac, I took the hash of the password I had from the passwd file, and set it into user-seed.conf and removed the passwd file and restarted... the user was then created with the password not as the previous password, but as the hash itself. as a result it seems this is a specified in the clear sort of thing...

Unless someone finds an undocumented option to do otherwise, but thought I would share the attempt.

EDIT: Although it occurs to me, if you already have the hashed version of the password, for the admin account... you probably could just drop the generated $SPLUNK_HOME/etc/passwd file everywhere, (and touch $SPLUNK_HOME/etc/.ui_login while you're at it...)

Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk on November 6 at 11AM PT, and empower your SOC to reach new heights! Duration: ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...