Security

LDAP Authentication, single group with multiple strategies.

JDukeSplunk
Builder

My gut and Googling tells me this won't work, but I'd like some backup or a link to direct documentation showing why/why-not.

Is it possible to have Splunk connected to LDAP1, LDAP2, and LDAP3 but only have roles mapped to LDAP1 Groups with user accounts from LDAP2 and LDAP3 present in them. This is a MS Active Directory setup, and of course this works for MS authentication because of trusts.

We have the 3 LDAP strategies currently but each has its own set of Splunk groups for role mappings. The AD folks want to consolidate these down to one set in one domain and add users from the other domains to them.

We have added test users, and Splunk can read the group membership but not as names. They show up as ;

CN=S-1-5-21-448539723-1935655697-839522115-47432,CN=ForeignSecurityPrincipals,DC=COMPANYNAME,DC=com
CN=S-1-5-21-448539723-1935655697-839522115-59596,CN=ForeignSecurityPrincipals,DC=COMPANYNAME,DC=com

0 Karma

corey_dick
Path Finder

You're seeing the same issue as this other user (https://answers.splunk.com/answers/2230/ldap-authentication-users-from-another-trusted-domain.html). It seems that the issue has to do with the way that AD responds back to the query. I'm having a similar issue as the linked problem.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...

Index This | How many sevens are there between 1 and 100?

August 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...