Security

LDAP - Issue in setting Bind DN

chimbudp
Contributor

1.Created new LDAP strategy to authenticate a group of users from AD.
2.Configured the User Settings & Group Settings which works good
3.I have configured LDAP under my User account - and i set the Bind DN accordingly
4.I could able to authenticate my group users successfully

When i Change the password of my account, i am losing my LDAP settings. Do i need to configure with a user name whose password never expires? (or) Is there way to update my password in Splunk LDAP strategy automatically when it got Changed ?

Kindly provide a solution to this -

0 Karma
1 Solution

krugger
Communicator

You should create a user for splunk to bind to the AD, give it permissions and set the "password never expires" option. If you don't do it, you will have to go to

Manager » Access controls » Authentication method » LDAP strategies » YourLDAP

and change the password each time it expires or you change it.

View solution in original post

krugger
Communicator

You should create a user for splunk to bind to the AD, give it permissions and set the "password never expires" option. If you don't do it, you will have to go to

Manager » Access controls » Authentication method » LDAP strategies » YourLDAP

and change the password each time it expires or you change it.

chimbudp
Contributor

Yes. This is what i am doing , each time when i Change my account pw , i am manually editing in my LDAP too.

0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...