Security

Multiple Roles inherited from LDAP Group Memberships

dominiquevocat
SplunkTrust
SplunkTrust

I have several indexes and created a role in splunk for each index. We have a RBAC system in place to grant users group memberships in our eDirectory based MetaDirectory. I map each splunk role to a LDAP groupmembership.

If a user has only one groupmembership all works fine.
If a user receives a second group membership it is shown fine in the user overview in Splunk Administration
The user does however not see the content of the index to which it received access by the second (N'th) group membership.

I modeled the role such that they have access to one index, the capability search and rtsearch.

What am i doing wrong?

Tags (2)
1 Solution

dominiquevocat
SplunkTrust
SplunkTrust

The roles were configured via the GUI and i assigned indizes to the roles. Seemingly each role had a srchFilter entry in the authorize.conf which caused the problem. Manually clearing the srchFilter from the authorize.conf seems to solve the issue.

View solution in original post

dominiquevocat
SplunkTrust
SplunkTrust

The roles were configured via the GUI and i assigned indizes to the roles. Seemingly each role had a srchFilter entry in the authorize.conf which caused the problem. Manually clearing the srchFilter from the authorize.conf seems to solve the issue.

Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...